A forum for reverse engineering, OS internals and malware analysis 

Discussion on reverse-engineering and debugging.
 #6770  by __Genius__
 Sat Jun 11, 2011 10:45 am
According to SANS institute :
Online attackers are paying increased attention to mobile devices. At the moment, the biggest mobile threat vector seems to take the form of trojan applications designed to run on a mobile phone and containing unwanted "features." If you come across a malicious program of that nature, how can you analyze it? This quick post notes several articles and tools that focus on examining inner-workings of Android mobile applications.

Android DroidDream Uses Two Vulnerabilities by Axelle Apvrilleprovides anoverview of the DroidDream trojaned Android application.

Dissecting Android Malware byDonato Ferrante documents abrief analysis of an Android malware sample using baksmali.

Android Reverse Engineering - A Kick Start byDhanesh presents technical notes and screen shots for analyzing an Android program from Linux.

How to Decompile / Reverse Engineer Android APK byTarandeep Singh offers a description of several tool and a tutorial on using APKTool for reversing Android apps.

androidAuditTools: Dynamic Android Analysis Tools bywuntee showcases the use of androidAuditTools to perform behavioral analysis of Android malware.

Analyzing Android Malware by Christiaan Beek explains how to analyzeVideoPlayer Android malware with the help of JD-gui decompiler.

Disassembling DEX Files by Gabor Paller demonstrates the use of dexdump and dedexter disassemblers for Android.

Examining the Recent Android Malware byJon Larimer outlines a walk-through of an analysis of the DroidDream/RootCager sample using baksmali


regards.