If 6,000 Mobile Malware Applications Could Talk - Analyzing Malware Behavior and Trends

If 6,000 Mobile Malware Applications Could Talk - Analyzing Malware Behavior and Trends

OWASP Foundation via YouTube Direct link

Dangerous Permissions

18 of 32

18 of 32

Dangerous Permissions

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

If 6,000 Mobile Malware Applications Could Talk - Analyzing Malware Behavior and Trends

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Matias Madou
  3. 3 Outline
  4. 4 Mobile Malware
  5. 5 Distribution
  6. 6 Malware Analysis
  7. 7 How to create an Android APK
  8. 8 Behavior analysis
  9. 9 Fingerprinting malware
  10. 10 Hotspot Shield
  11. 11 Monkey Jump
  12. 12 APK Scan
  13. 13 What is APK Scan
  14. 14 Statistics
  15. 15 User Uploads
  16. 16 Top Malware
  17. 17 Top 10 Permission Requests
  18. 18 Dangerous Permissions
  19. 19 Leaked Location
  20. 20 Information Leakage
  21. 21 Sandbox Permissions
  22. 22 Conclusion
  23. 23 Flashlight
  24. 24 Permission Bingo
  25. 25 FakeToken
  26. 26 How does it work
  27. 27 Sandbox detection
  28. 28 Historical analysis
  29. 29 Conclusions
  30. 30 Future work
  31. 31 Phone analysis
  32. 32 Android or iOS

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.