Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Chapter 1: Looking at the Ecosystem
Understanding Android's Roots Understanding Android Stakeholders Grasping Ecosystem Complexities Summary
Chapter 2: Android Security Design and Architecture
Understanding Android System Architecture Understanding Security Boundaries and Enforcement Looking Closer at the Layers Complex Security, Complex Exploits Summary
Chapter 3: Rooting Your Device
Understanding the Partition Layout Understanding the Boot Process Locked and Unlocked Boot Loaders Rooting with an Unlocked Boot Loader Rooting with a Locked Boot Loader History of Known Attacks Summary
Chapter 4: Reviewing Application Security
Common Issues Case Study: Mobile Security App Case Study: SIP Client Summary
Chapter 5: Understanding Android's Attack Surface
An Attack Terminology Primer Classifying Attack Surfaces Remote Attack Surfaces Physical Adjacency Local Attack Surfaces Physical Attack Surfaces Third-Party Modifications Summary
Chapter 6: Finding Vulnerabilities with Fuzz Testing
Fuzzing Background Fuzzing on Android Fuzzing Broadcast Receivers Fuzzing Chrome for Android Fuzzing the USB Attack Surface Summary
Chapter 7: Debugging and Analyzing Vulnerabilities
Getting All Available Information Choosing a Toolchain Debugging with Crash Dumps Remote Debugging Debugging Dalvik Code Debugging Native Code Debugging Mixed Code Alternative Debugging Techniques Vulnerability Analysis Summary
Chapter 8: Exploiting User Space Software
Memory Corruption Basics A History of Public Exploits Exploiting the Android Browser Summary
Chapter 9: Return Oriented Programming
History and Motivation Basics of ROP on ARM Case Study: Android 4.0.1 Linker Summary
Chapter 10: Hacking and Attacking the Kernel
Android's Linux Kernel Extracting Kernels Running Custom Kernel Code Debugging the Kernel Exploiting the Kernel Summary
Chapter 11: Attacking the Radio Interface Layer
Introduction to the RIL Short Message Service (SMS) Interacting with the Modem Summary
Chapter 12: Exploit Mitigations
Classifying Mitigations Code Signing Hardening the Heap Protecting Against Integer Overflows Preventing Data Execution Address Space Layout Randomization Protecting the Stack Format String Protections Read-Only Relocations Sandboxing Fortifying Source Code Access Control Mechanisms Protecting the Kernel Other Hardening Measures Summary of Exploit Mitigations Disabling Mitigation Features Overcoming Exploit Mitigations Looking to the Future Summary
Chapter 13: Hardware Attacks
Interfacing with Hardware Devices Identifying Components Intercepting, Monitoring, and Injecting Data Stealing Secrets and Firmware Pitfalls Summary
Appendix A: Tool Catalog
Development Tools Firmware Extraction and Flashing Tools Native Android Tools Hooking and Instrumentation Tools Static Analysis Tools Application Testing Tools Hardware Hacking Tools
Appendix B: Open Source Repositories
Google SoC Manufacturers OEMs Upstream Sources Others
Appendix C: References
Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 Chapter 13 General References
Introduction
Overview of the Book and Technology How This Book Is Organized Who Should Read This Book Tools You Will Need What's on the Website Bon Voyage
End User License Agreement
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion