
Amazon Prime Free Trial
FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with FREE Delivery" below the Add to Cart button and confirm your Prime free trial.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited FREE Prime delivery
- Streaming of thousands of movies and TV shows with limited ads on Prime Video.
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.
Buy new:
-19% $42.01$42.01
Ships from: Amazon.com Sold by: Amazon.com
Save with Used - Good
$6.67$6.67
FREE delivery May 1 - 6
Ships from: ThriftBooks-Chicago Sold by: ThriftBooks-Chicago

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Android Hacker's Handbook 1st Edition
Purchase options and add-ons
The first comprehensive guide to discovering and preventing attacks on the Android OS
As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.
If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.
- A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis
- Covers Android application building blocks and security as well as debugging and auditing Android apps
- Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack
- ISBN-10111860864X
- ISBN-13978-1118608647
- Edition1st
- PublisherWiley
- Publication dateMarch 31, 2014
- LanguageEnglish
- Dimensions7.1 x 1.2 x 9.1 inches
- Print length576 pages
Frequently bought together

Customers who viewed this item also viewed
Editorial Reviews
From the Inside Flap
A complete guide to securing the Android operating system
The Android Hacker’s Handbook provides network security professionals and mobile device administrators with the specifics of the Android operating system from a security standpoint. This book explains how the operating system works, security risks associated with it, and the overall security architecture of the operating system. It also explains how vulnerabilities can be found in, and exploits developed for, various components of the system.
Written by some of the world’s foremost Android security researchers, the Android Hacker’s Handbook is the only resource of its kind to explore Android security on this level. This essential guide includes both implementation details as well as complexities introduced by the open nature of the OS.
Learn to:
- Become familiar with security implementation details, as well as complexities introduced by the open nature of the Android OS
- Avoid common security pitfalls and stay ahead of the latest smartphone hacking strategies
- Review the various types of attacks that have been successful against the Android OS
- Explore rooting and gain an understanding of the partition layout, boot process
- Understand the complex nature of the Android ecosystem, including the impact of various hardware vendors and software developers
From the Back Cover
A complete guide to securing the Android operating system
The Android Hacker’s Handbook provides network security professionals and mobile device administrators with the specifics of the Android operating system from a security standpoint. This book explains how the operating system works, security risks associated with it, and the overall security architecture of the operating system. It also explains how vulnerabilities can be found in, and exploits developed for, various components of the system.
Written by some of the world’s foremost Android security researchers, the Android Hacker’s Handbook is the only resource of its kind to explore Android security on this level. This essential guide includes both implementation details as well as complexities introduced by the open nature of the OS.
Learn to:
- Become familiar with security implementation details, as well as complexities introduced by the open nature of the Android OS
- Avoid common security pitfalls and stay ahead of the latest smartphone hacking strategies
- Review the various types of attacks that have been successful against the Android OS
- Explore rooting and gain an understanding of the partition layout, boot process
- Understand the complex nature of the Android ecosystem, including the impact of various hardware vendors and software developers
About the Author
JOSHUA J. DRAKE is a Director of Research Science at Accuvant LABS.
PAU OLIVA FORA is a Mobile Security Engineer with viaForensics.
ZACH LANIER is a Senior Security Researcher at Duo Security.
COLLIN MULLINER is a postdoctoral researcher at Northeastern University.
STEPHEN A. RIDLEY is a Principal Researcher with Xipiter.
GEORG WICHERSKI is a Senior Security Researcher with CrowdStrike.
Product details
- Publisher : Wiley; 1st edition (March 31, 2014)
- Language : English
- Paperback : 576 pages
- ISBN-10 : 111860864X
- ISBN-13 : 978-1118608647
- Item Weight : 2.28 pounds
- Dimensions : 7.1 x 1.2 x 9.1 inches
- Best Sellers Rank: #208,673 in Books (See Top 100 in Books)
- #96 in Privacy & Online Safety
- #123 in Computer Hacking
- #249 in Internet & Telecommunications
- Customer Reviews:
About the authors
Pau Oliva Fora (@pof) is a security consultant and enjoys a diverse and challenging role performing penetration testing, reverse engineering and vulnerability discovery. Pau has a strong passion for Android security, and has worked as Mobile Security Engineer doing projects for major OEMs, government, law enforcement, health and finance sectors. He has been actively researching security aspects of the Android operating system since its debut on 2008 and is co-author of Wiley's Android Hacker's Handbook. Pau has spoken at a variety of security conferences, including DefCon, RSA, Android Security Symposium, OWASP, NoConName, RootedCon, Radare2Con and LaCon. When he's not poking around mobile devices, he enjoys playing Super Street Fighter 2 Turbo and listening to Chiptune music.
Zach Lanier is a Senior Security Researcher at Duo Security. He has been "doing security" since 2001. In 2009, he started focusing more on mobile and embedded device security, from apps to platforms (especially Android), mobile network, and carrier security. He has presented at various public and private industry conferences, such as BlackHat, CanSecWest, DEFCON, ShmooCon, and more.
You can find him at https://n0where.org/ and https://labs.duosecurity.com/
Discover more of the author’s books, see similar authors, read book recommendations and more.
Collin Mulliner is a postdoctoral researcher in the Systems Security Lab at
Northeastern University. He received a Ph.D. from the Technische Universität Berlin in 2011, and a M.S. and B.S. in computer science from UC Santa Barbara and FH-Darmstadt, respectively. Collin's main area of expertise is the security and privacy of mobile and embedded systems with an emphasis on mobile and smart phones. He further has a specific interest in vulnerability analysis and offensive security. Recently he switched his focus to the defensive side to work on mitigations and countermeasures. Collin is a regular speaker at conferences such as CanSecWest, Black Hat, SyScan, Defcon, Hack in the Box, and CCC.
Discover more of the author’s books, see similar authors, read book recommendations and more.
A full bio of Stephen A. Ridley is available at this page:
http://about.me/s7ephen
Stephen's Twitter account is:
http://www.twitter.com/s7ephen
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonCustomers say
Customers find the book highly detailed and informative, with one review noting it provides precise information on the least understood subjects. They appreciate its protection level, with one customer highlighting its coverage of attack surfaces and vulnerabilities.
AI-generated from the text of customer reviews
Select to learn more
Customers appreciate the depth of the book, finding it highly detailed and informative, with one customer noting it provides precise information on the least understood subjects.
"...After reading through each chapter, you'll feel like you've gained a huge knowledge base, which you could immediately apply in real-life scenario...." Read more
"...Still a good intro into vulns and a good history for the purpose of perspective...." Read more
"...This is original material and serious read. I am hoping to extend this review when I make progress to completion." Read more
"...The authors do an incredible job explaining things from start to finish. Chapter 3 on rooting devices also looks full of goodies...." Read more
Customers appreciate the book's approach to security, with one customer highlighting its coverage of attack surfaces and vulnerabilities.
"...So much fun and unprotected (spoken from the root desired perspective, not black hax)...." Read more
"...and android, dives deep into Android architecture, attack surfaces and vulnerabilities and even shows previous discovered exploits...." Read more
"Good for protecting your android phone...." Read more
Top reviews from the United States
There was a problem filtering reviews. Please reload the page.
- Reviewed in the United States on April 15, 2014Just finished reading the book - "Android Hackers Handbook". Truth be told, you can't find any other book which covers Android security and exploitation in such a detailed approach like this one.
After reading through each chapter, you'll feel like you've gained a huge knowledge base, which you could immediately apply in real-life scenario. I personally liked 4 chapters out of the total 13 the most - Debugging and Analysing Vulnerabilities (Chap7), User Space (Chap 8) Exploitation, ROP(Chap9) and Attacking RIL (Chap 11) .
Almost all of the concepts are explained along with the real code sample, which will help you when you try it out on your device. A perfect 5 for this book coming from the experts in Android Security.
- Reviewed in the United States on June 12, 2017Out of date now but that's to be expected in this game of ours. Still a good intro into vulns and a good history for the purpose of perspective. Too bad new vulns are few and far between...ah the good old days of Android. So much fun and unprotected (spoken from the root desired perspective, not black hax). (:
- Reviewed in the United States on June 28, 2014I have not finished the book and honestly I am not even close, but I wanted to give a review anyway because the technical depth of the book is amazing. This is not like some of the other books which provides content from web and other sources. This is original material and serious read. I am hoping to extend this review when I make progress to completion.
- Reviewed in the United States on June 10, 2015Haven't finished it yet, but the book does assume that the reader is an expert in many other computer science fields. One may say "well, duh," but even in the first chapter it appears that the author assumes one is an engineer.
- Reviewed in the United States on April 28, 2014After reading the first chapter, you get a clear understanding of Android's origins and how the whole ecosystem works. The authors do an incredible job explaining things from start to finish. Chapter 3 on rooting devices also looks full of goodies. Great for plane and leisure reading, as well as to learn the fundamentals of Android security. Recommended for sure!
- Reviewed in the United States on June 4, 2016For a software/electrical engineer who is new to Android, this book seems just right. It don't insult your intelligence by defining well known concepts. It gives precise information on the least understood subjects, or the subjects that are voluntarily kept in the dark.
- Reviewed in the United States on October 17, 2015The book is well organized, sadly missing alot of details.
The first chapters are not well structured, with a lot of missing details, hardly reproducible, the enviroment setup is not explaind correctly.
Some chapters have only 2 pages, crear lack of information an will to write decent chapter.
The only thing decent in the intire book is a single vuln. Explained in resonable detail.
In shot a mess, i will think twice before buying any thing from any of the authors again.
- Reviewed in the United States on January 8, 2015This book is an expansive guide to Android's security architecture. It is easy-to-follow and well-written, not riddled with typos and poorly laid out like many computer science textbooks. It can be a bit wordy and very technical. This is not a book for people new to Android, you should have some experience with Java and C if you want to fully appreciate this book.
Top reviews from other countries
-
FabriceReviewed in France on June 13, 2014
4.0 out of 5 stars Super mais en anglais
Un super ouvrage pour les utilisateurs de produits utilisant Android (smartphones, tablettes etc.)
Pour les anglophones. Un livre assez pointu pour les non connaisseurs des systèmes et de la programmation sous Unix/Linux et Java, mais accessible à tout curieux de ce monde ouvert et/ou à tout curieux de ce que fait son portable android, et comment mieux le gérer.
A conseiller à tout curieux (anglophone) de ce qu'est une machine Android et comment l'atteindre au cœur.
Ouvrage récent ( couvrant jusqu'à Android 4.4.2 )
- LismoreReviewed in the United Kingdom on January 28, 2016
5.0 out of 5 stars Five Stars
Great book the right level of in depth technical detail needed.
I rooted my new phone soon after
- Swaraj PavitrakarReviewed in India on April 1, 2018
5.0 out of 5 stars Five Stars
This was quite good and the delivery was perfect on time too.
- yadocReviewed in Spain on January 29, 2015
5.0 out of 5 stars Nice book
Very interesting book with a different perspective on Google Android operating system from the hackers view. Nice format and index.
-
Marcel BolliReviewed in Germany on August 11, 2016
5.0 out of 5 stars Optimal für Entwickler
Ein Buch, das jeder Android Entwickler sich anschauen sollte. Sehr gute Beschreibungen, gut strukturiert. Security Design, Rooting, Hardware Attacks, etc. Wie es der Buchtitel beschreibt