Bulletproof Android
Practical Advice for Building Secure Apps
Samenvatting
Battle-Tested Best Practices for Securing Android Apps throughout the Development Lifecycle
Android’s immense popularity has made it today’s #1 target for attack: high-profile victims include eHarmony, Facebook, and Delta Airlines, just to name a few. Today, every Android app needs to resist aggressive attacks and protect data, and in ‘Bulletproof Android’, Godfrey Nolan shows you how.
Unlike “black hat/gray hat” books, which focus on breaking code, this guide brings together complete best practices for hardening code throughout the entire development lifecycle. Using detailed examples from hundreds of apps he has personally audited, Nolan identifies common “anti-patterns” that expose apps to attack, and then demonstrates more secure solutions.
Nolan covers authentication, networking, databases, server attacks, libraries, hardware, and more. He illuminates each technique with code examples, offering expert advice on implementation and trade-offs. Each topic is supported with a complete sample app, which demonstrates real security problems and solutions.
Learn how to:
- Apply core practices for securing the platform
- Protect code, algorithms, and business rules from reverse engineering
- Eliminate hardcoding of keys, APIs, and other static data
- Eradicate extraneous data from production APKs
- Overcome the unique challenges of mobile authentication and login
- Transmit information securely using SSL
- Prevent man-in-the-middle attacks
- Safely store data in SQLite databases
- Prevent attacks against web servers and services
- Avoid side-channel data leakage through third-party libraries
- Secure APKs running on diverse devices and Android versions
- Achieve HIPAA or FIPS compliance
- Harden devices with encryption, SELinux, Knox, and MDM
- Preview emerging attacks and countermeasures
Specificaties
Inhoudsopgave
U kunt van deze inhoudsopgave een PDF downloaden
Acknowledgments
About the Author
1. Android Security Issues
-Why Android?
-Guidelines
-Securing the Devic
-Conclusion
2. Protecting Your Code
-Looking into the classes.dex File
-Obfuscation Best Practices
-Smali
-Hiding Business Rules in the NDK
-Conclusion
3. Authentication
-Secure Logins
-Understanding Best Practices for User Authentication and Account Validation
-Application Licensing with LVL
-OAut
-User Behavior
-Conclusion
4. Network Communication
-HTTP(S) Connection
-Symmetric Keys
-Asymmetric Keys
-Ineffective SSL
-Conclusion
5. Android Databases
-Android Database Security Issues
-SQLite
-SQLCipher
-Hiding the Key
-SQL Injection
-Conclusion
6. Web Server Attacks
-Web Services
-Cross Platform
-WebView Attacks
-Cloud
-Conclusion
7. Third-Party Library Integration
-Transferring the Risk
-Permissions
-Installing Third-Party Apps
-Trust but Verify
-Conclusion
8. Device Security
-Wiping Your Device
-Fragmentation
-Device Encryption
-SEAndroid
-FIPS 140-2
-Mobile Device Management
-Conclusion
9. The Future
-More Sophisticated Attacks
-Internet of Things
-Audits and Compliance
-Tools
-Conclusion
Index
Anderen die dit boek kochten, kochten ook
Rubrieken
- cadeauboeken
- computer en informatica
- economie
- filosofie
- flora en fauna
- geneeskunde
- geschiedenis
- gezondheid
- jeugd
- juridisch
- koken en eten
- kunst en cultuur
- literatuur en romans
- mens en maatschappij
- naslagwerken
- non-fictie informatief/professioneel
- paramedisch
- psychologie
- reizen
- religie
- schoolboeken
- spiritualiteit
- sport, hobby, lifestyle
- thrillers en spanning
- wetenschap en techniek
- woordenboeken en taal