Franklin
Staff View
LEADER 02528nam a22004455i 4500
001
9977534104003681
005
20200630205604.0
006
m o d |
007
cr -n---------
008
120912s2012 xxu| o |||| 0|eng d
020
a| 1-4302-4249-3
024
7
a| 10.1007/978-1-4302-4249-9
2| doi
035
a| (CKB)3460000000084488
035
a| (EBL)1156013
035
a| (OCoLC)831116191
035
a| (SSID)ssj0000737009
035
a| (PQKBManifestationID)11469200
035
a| (PQKBTitleCode)TC0000737009
035
a| (PQKBWorkID)10773448
035
a| (PQKB)11534855
035
a| (DE-He213)978-1-4302-4249-9
035
a| (MiAaPQ)EBC1156013
035
a| (CaSebORM)9781430242482
035
a| (PPN)168289946
035
a| (EXLCZ)993460000000084488
040
a| UMI
c| UMI
041
a| eng
050
4
a| QA76.59
072
7
a| UY
2| bicssc
072
7
a| COM014000
2| bisacsh
082
0
0
a| 005.258
090
a| QA76.76.A65
b| N65 2012
100
1
a| Nolan, Godfrey.
e| author.
4| aut
4| http://id.loc.gov/vocabulary/relators/aut
245
1
0
a| Decompiling Android
h| [electronic resource] /
c| by Godfrey Nolan.
250
a| 1st ed. 2012.
264
1
a| Berkeley, CA :
b| Apress :
b| Imprint: Apress,
c| 2012.
300
a| 1 online resource (294 p.)
336
a| text
b| txt
337
a| computer
b| c
338
a| online resource
b| cr
347
a| text file
505
0
a| Title Page; Copyright Page; Dedication Page; Contents at a Glance; Table of Contents; About the Author; About the Technical Reviewer; Acknowledgments; Preface; Chapter 1 Laying the Groundwork; Compilers and Decompilers; Virtual Machine Decompilers; Why Java with Android?; Why Android?; History of Decompilers; Reviewing Interpreted Languages More Closely: Visual Basic; Hanpeter van Vliet and Mocha; Legal Issues to Consider When Decompiling; Protection Laws; Patents; Copyright; Directive on the Legal Protection of Computer Programs; Reverse Engineering; The Legal Big Picture; Moral Issues
505
8
a| Protecting YourselfSummary; Chapter 2 Ghost in the Machine; The JVM: An Exploitable Design; Simple Stack Machine; Heap; Program Counter Registers; Method Area; JVM Stack; Inside a Class File; Magic Number; Minor and Major Versions; Constant-Pool Count; Constant Pool; Access Flags; The this Class and the Superclass; Interfaces and Interface Count; Fields and Field Count; Field Attributes; Methods and Method Count; Method Attributes; Attributes and Attributes Count; Summary; Chapter 3 Inside the DEX File; Ghost in the Machine, Part Deux; Converting Casting.class
505
8
a| Breaking the DEX File into Its Constituent PartsThe Header Section; Magic; Checksum; Header_size; Endian_tag; The string_ids Section; The type_ids Section; The proto_ids Section; The field_ids Section; The method_ids Section; The class_defs Section; The data Section; class_data_item; code_item; Summary; Chapter 4 Tools of the Trade; Downloading the APK; Backing Up the APK; Forums; Platform Tools; Rooting the Phone; Installing and Using the Platform Tools; Decompiling an APK; What's in an APK File?; Random APK Issues; Web Service Keys and Logins; Database Schemas; HTML5/CSS; Fake Apps
505
8
a| DisassemblersHex Editors; dx and dexdump; dedexer; baksmali; Decompilers; Mocha; Jad; JD-GUI; dex2jar; undx; apktool; Protecting Your Source; Writing Two Versions of the Android App; Obfuscation; Layout Obfuscations; Control Obfuscations; Computation Obfuscation; Aggregation Obfuscation; Ordering Obfuscation; Data Obfuscations; Ordering; Obfuscation Conclusion; Web Services; Fingerprinting Your Code; Native Methods; Non-Obfuscation Strategies Conclusion; Obfuscators; Crema; ProGuard; DashO; JavaScript Obfuscators; Summary; Chapter 5 Decompiler Design; Theory Behind the Design
505
8
a| Defining the Problem(De)Compiler Tools; Lex and Yacc; JLex and CUP Example; JLex; CUP; ANTLR; ANTLR Example; Strategy: Deciding on your Parser Design; Choice One; Choice Two; Choice Three; Choice Four; Parser Design; Summary; Chapter 6 Decompiler Implementation; DexToXML; Parsing the dex.log Output; ANTLR at Work; Rules; Outputting the Magic Number; DexToSource; Example 1: Casting.java; Bytecode Analysis; Parser; Java; Example 2: Hello World; Bytecode Analysis; Parser; Java; Example 3: if Statement; Bytecode Analysis; Parser; Java; Refactoring; Summary
505
8
a| Chapter 7 Hear No Evil, See No Evil: A Case Study
546
a| English
500
a| Includes index.
520
a| Decompiling Android looks at the the reason why Android apps can be decompiled to recover their source code, what it means to Android developers and how you can protect your code from prying eyes. This is also a good way to see how good and bad Android apps are constructed and how to learn from them in building your own apps. This is becoming an increasingly important topic as the Android marketplace grows and developers are unwittingly releasing the apps with lots of back doors allowing people to potentially obtain credit card information and database logins to back-end systems, as they don’t realize how easy it is to decompile their Android code. In depth examination of the Java and Android class file structures Tools and techniques for decompiling Android apps Tools and techniques for protecting your Android apps.
650
0
a| Mobile computing.
650
0
a| Software engineering.
650
1
4
a| Mobile Computing.
0| https://scigraph.springernature.com/ontologies/product-market-codes/I29060
650
2
4
a| Software Engineering/Programming and Operating Systems.
0| https://scigraph.springernature.com/ontologies/product-market-codes/I14002
776
z| 1-4302-4248-5
906
a| BOOK