Joke Collection Website - Public benefit messages - Book list of mobile phone virus exposure
Book list of mobile phone virus exposure
Basics
Chapter 1 Approaching Mobile Phone Viruses
1.1 The Emergence of Mobile Phone Viruses
1.2 Definition of Mobile Phone Viruses
1.3 The operating principle of mobile phone viruses
1.4 Characteristics of mobile phone viruses
1.4.1 Small size and specific functions
1.4.2 Multiple transmission Method
1.4.3 Flexibility based on wireless network
1.5 General symptoms of mobile phone poisoning
1.5.1 Slow system response
1.5.2 Inexplicable SMS or MMS messages
1.5.3 Automatic networking
1.5.4 Call quality decline or delay
1.5.5 Increased power consumption
1.6 The harm of mobile phone viruses
1.6.1 Direct damage
1.6.2 Dramatic increase in phone bills
1.6.3 Secret theft and monitoring
1.6.4 Deception and blackmail
1.7 Major events of mobile viruses
1.8 Development trends of mobile viruses
1.8.1 Diversity
1.8.2 Hidden
1.8.3 Underlying
1.8.4 Stubborn
1.8.5 Anti-antivirus
Chapter 2 Basic knowledge of mobile phone structure
2.1 Concepts of embedded systems and embedded operating systems
2.2 Smart and non-smart phones
2.3 ROM and RAM
2.4 SMS and MMS
2.5 Infrared and Bluetooth
2.6 CMNET and CMWAP
2.7 Smartphone System
2.7.1 Symbian
2.7.2 Windows Mobile
2.7.3 Linux
2.7.4 Threads and Tasks
p>
Understanding
Chapter 3 Mobile Phone Defects and Virus Attacks
3.1 The Concept of Systemic Defects in Mobile Phones
3.2 Case Study: Short Message Death Lock vulnerability
3.2.1 Vulnerability details analysis
3.2.2 Vulnerability exploitation process
3.2.3 Methods to prevent attacks from this vulnerability
3.3 The concept of functional defects of mobile phones
Chapter 4 The terrifying mobile phone Trojans
4.1 The origin of “Trojans”
4.2 The dangers of Trojan viruses
p>4.2.1 Remote secret theft
4.2.2 Call monitoring
4.2.3 Information interception
4.2.4 Forgery and deception
4.3 Principle of mobile Trojan implementation
4.3.1 Self-starting activation method
4.3.2 Self-hiding technology
4.3.3 Running in the background Implementation
4.3.4 Reception of control commands
4.3.5 Command execution process
4.3.6 Result feedback
4.4 Example analysis :Identification and removal of various mobile phone Trojan viruses
4.4.1 flocker mobile phone Trojan virus
4.4.2 Pbbstealer mobile phone Trojan virus
4.4.3 Commwarrior mobile phone Trojan virus
4.4.4 Cardtrap mobile Trojan virus
4.4.5 RommWar mobile Trojan virus
4.4.6 Doomboot.A mobile Trojan virus
4.5 Basic identification methods of mobile phone Trojans
Chapter 5 The worm that spreads with the Internet
Worm virus
5.1 What is worm virus
5.2 Background of the emergence of mobile phone worm virus
5.2.1 The unreliability of Bluetooth technology
5.2.2 Spread of worms
5.3 The first mobile phone worm - "Kapol"
5.3.1 The onset of viruses
5.3 .2 How to deal with viruses
5.4 Introduction to Mabir worms
5.5 Introduction to Skulls series viruses
5.6 Case study: Basic principles of mobile phone worms
5.6.1 Background introduction
5.6.2 Tools and uses for writing worms
5.6.3 Symbian application initialization process
5.6.4 Source code explanation
5.6.5 Basic methods of virus removal
Chapter 6 Dangerous flashing and mobile phone upgrade
6.1 The concept of flashing
6.2 Hidden dangers caused by flashing
6.3 The concept of mobile phone system upgrade
6.4 Hidden dangers caused by upgrading
6.5 Case study: mobile phone flashing experiment
6.5.1 Experimental Tools
6.5.2 Experimental Process
Chapter 7: Bundled Mobile Phone Virus Hidden in the Thread
7.1 What is File Bundling
7.2 Preliminary understanding of SIS format
7.3 Disassemble SIS files
7.4 Basic implementation of SIS bundled viruses
7.5 Bundled viruses Characteristics and hazards
7.6 Identification and prevention of bundled viruses'
Chapter 8 The emergence of mobile phone rogue software
8.1 Introduction to the background of rogue software
8.2 Classification of rogue software and its malicious behavior
8.3 Harm of rogue software
8.4 Case study: analysis of a typical rogue software
8.4. 1 Malicious software infection process
8.4.2 Malicious software removal method
Chapter 9 Rootkit on mobile phones
9.1 Rootkit technology
9.2 File Hiding
9.3 Task/Thread Hiding
9.4 Driver-Level Rootkit
9.5 Demons Hiding in Hardware
9.6 Mobile Phones Analysis of the future development trend of Rootkit
Prevention
Chapter 10: Methods of discovering mobile phone viruses
10.1 Checking the self-starting method of mobile phones
10.2 Mobile phone file system check
10.3 Mobile phone running task check
10.4 Mobile phone network check
10.5 Mobile phone function check
Chapter 11 Mobile Phone Viruses Reverse analysis
11.1 Introduction to reverse engineering technology
11.2 ARM assembly language
11.2.1 ARM company and ARM-based embedded systems
11.2.2 ARM programming model
11.2.3 Memory format of ARM architecture
11.2.4 Register usage in ARM state
11.2.5 ARM Command system and addressing method
11.3 IDA Pro
11.4 Reverse analysis of Kapol virus
Chapter 12 Introduction to mainstream mobile anti-virus software
p>12.1 F-Secure
12.2 Kaspersky Anti-Virus Software
12.3 Symantec Mobile Anti-Virus Software
12.4 McCafé Mobile Anti-Virus
1
2.5 Xiaohongsan AntiVirMobile
12.6 BitDefender Mobile Security
12.7 NetQin Mobile Antivirus Software
12.8 Rising Antivirus Software
12.9 Kingsoft Antivirus Mobile version
12.10 Jiangmin anti-virus software
12.11 Guanghua mobile anti-virus software
12.12 Disadvantages of mobile anti-virus software
…… p>
- Related articles
- How to remove the car GPS locator
- What does the free upgrade version of home network calls in the province mean?
- Ask who knows when the gas subsidy will be issued in Xinglong Town, Linyi County, Shandong Province in 221.
- 139 E-mail sent a text message but there was no record. Is the mobile phone number empty?
- Can I still get text messages when my mobile phone is rubbed?
- How to change the line feed key of Xiaomi mobile phone input method into the send key
- Begging for CCTV Yu Jia’s classic commentary
- The birthday greetings of ten-year-old children are very short.
- China Bank binds the official account of "China Bank Credit Card" WeChat.
- What if Gitzo is overdue for three months?