ABSTRACT

This chapter describes the malware basics—how to identify malware, malware behavior, and malware features. It discusses a custom Android BOT application created and demonstrates to the reader how potential malware can bypass Android built-in checks. The Android BOT walkthrough will include stealing a user's browser history and Short Message Service as well as call logs, and it attempts to drain the phone's battery. The chapter presents a sample application to show the readers how to reverse engineer or analyze malicious applications. Reverse engineering is the process of discovering the technological principles of a device, object, or system through analysis of its structure, function, and operation. Reverse engineering comprises a set of techniques that can identify how software is going to behave. Reverse engineering has been around for a long time—competitors tries to reverse engineer popular products, the government trying to reverse engineer defense technologies of their opponents, mathematicians trying to reverse engineer ciphers.