Suggested Reading
Mobile App Security
Android
- Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehous (2015) Mobile Application Hacker’s Handbook. Wiley. Available at: https://www.wiley.com/en-us/The+Mobile+Application+Hacker%27s+Handbook-p-9781118958506
- Joshua J. Drake, Zach Lanier, Collin Mulliner, Pau Oliva, Stephen A. Ridley, Georg Wicherski (2014) Android Hacker’s Handbook. Wiley. Available at: https://www.wiley.com/en-us/Android+Hacker%27s+Handbook-p-9781118608647
- Godfrey Nolan (2014) Bulletproof Android. Addison-Wesley Professional. Available at: https://www.amazon.com/Bulletproof-Android-Practical-Building-Developers/dp/0133993329
- Nikolay Elenkov (2014) Android Security Internals: An In-Depth Guide to Android’s Security Architecture. No Starch Press. Available at: https://nostarch.com/androidsecurity
- Jonathan Levin (2015) Android Internals :: A confectioners cookbook - Volume I: The power user’s view. Technologeeks.com. Available at: http://newandroidbook.com/
iOS
- Charlie Miller, Dionysus Blazakis, Dino Dai Zovi, Stefan Esser, Vincenzo Iozzo, Ralf-Philipp Weinmann (2012) iOS Hacker’s Handbook. Wiley. Available at: https://www.wiley.com/en-us/iOS+Hacker%27s+Handbook-p-9781118204122
- David Thiel (2016) iOS Application Security, The Definitive Guide for Hackers and Developers. no starch press. Available at: https://www.nostarch.com/iossecurity
- Jonathan Levin (2017), Mac OS X and iOS Internals, Wiley. Available at: http://newosxbook.com/index.php
Reverse Engineering
- Bruce Dang, Alexandre Gazet, Elias Backaalany (2014) Practical Reverse Engineering. Wiley. Available at: https://www.wiley.com/en-us/Practical+Reverse+Engineering%3A+x86%2C+x64%2C+ARM%2C+Windows+Kernel%2C+Reversing+Tools%2C+and+Obfuscation-p-9781118787311
- Skakenunny, Hangcom iOS App Reverse Engineering. Online. Available at: https://github.com/iosre/iOSAppReverseEngineering/
- Bernhard Mueller (2016) Hacking Soft Tokens - Advanced Reverse Engineering on Android. HITB GSEC Singapore. Available at: http://gsec.hitb.org/materials/sg2016/D1%20-%20Bernhard%20Mueller%20-%20Attacking%20Software%20Tokens.pdf
- Dennis Yurichev (2016) Reverse Engineering for Beginners. Online. Available at: https://beginners.re/
- Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters (2014) The Art of Memory Forensics. Wiley. Available at: https://www.wiley.com/en-us/The+Art+of+Memory+Forensics%3A+Detecting+Malware+and+Threats+in+Windows%2C+Linux%2C+and+Mac+Memory-p-9781118825099
- Jacob Baines (2016) Programming Linux Anti-Reversing Techniques. Leanpub. Available at: https://leanpub.com/anti-reverse-engineering-linux