Joke Collection Website - Public benefit messages - Book list of mobile phone virus exposure

Book list of mobile phone virus exposure

Basics

Chapter 1 Approaching Mobile Phone Viruses

1.1 The Emergence of Mobile Phone Viruses

1.2 Definition of Mobile Phone Viruses

1.3 The operating principle of mobile phone viruses

1.4 Characteristics of mobile phone viruses

1.4.1 Small size and specific functions

1.4.2 Multiple transmission Method

1.4.3 Flexibility based on wireless network

1.5 General symptoms of mobile phone poisoning

1.5.1 Slow system response

1.5.2 Inexplicable SMS or MMS messages

1.5.3 Automatic networking

1.5.4 Call quality decline or delay

1.5.5 Increased power consumption

1.6 The harm of mobile phone viruses

1.6.1 Direct damage

1.6.2 Dramatic increase in phone bills

1.6.3 Secret theft and monitoring

1.6.4 Deception and blackmail

1.7 Major events of mobile viruses

1.8 Development trends of mobile viruses

1.8.1 Diversity

1.8.2 Hidden

1.8.3 Underlying

1.8.4 Stubborn

1.8.5 Anti-antivirus

Chapter 2 Basic knowledge of mobile phone structure

2.1 Concepts of embedded systems and embedded operating systems

2.2 Smart and non-smart phones

2.3 ROM and RAM

2.4 SMS and MMS

2.5 Infrared and Bluetooth

2.6 CMNET and CMWAP

2.7 Smartphone System

2.7.1 Symbian

2.7.2 Windows Mobile

2.7.3 Linux

2.7.4 Threads and Tasks

p>

Understanding

Chapter 3 Mobile Phone Defects and Virus Attacks

3.1 The Concept of Systemic Defects in Mobile Phones

3.2 Case Study: Short Message Death Lock vulnerability

3.2.1 Vulnerability details analysis

3.2.2 Vulnerability exploitation process

3.2.3 Methods to prevent attacks from this vulnerability

3.3 The concept of functional defects of mobile phones

Chapter 4 The terrifying mobile phone Trojans

4.1 The origin of “Trojans”

4.2 The dangers of Trojan viruses

p>

4.2.1 Remote secret theft

4.2.2 Call monitoring

4.2.3 Information interception

4.2.4 Forgery and deception

4.3 Principle of mobile Trojan implementation

4.3.1 Self-starting activation method

4.3.2 Self-hiding technology

4.3.3 Running in the background Implementation

4.3.4 Reception of control commands

4.3.5 Command execution process

4.3.6 Result feedback

4.4 Example analysis :Identification and removal of various mobile phone Trojan viruses

4.4.1 flocker mobile phone Trojan virus

4.4.2 Pbbstealer mobile phone Trojan virus

4.4.3 Commwarrior mobile phone Trojan virus

4.4.4 Cardtrap mobile Trojan virus

4.4.5 RommWar mobile Trojan virus

4.4.6 Doomboot.A mobile Trojan virus

4.5 Basic identification methods of mobile phone Trojans

Chapter 5 The worm that spreads with the Internet

Worm virus

5.1 What is worm virus

5.2 Background of the emergence of mobile phone worm virus

5.2.1 The unreliability of Bluetooth technology

5.2.2 Spread of worms

5.3 The first mobile phone worm - "Kapol"

5.3.1 The onset of viruses

5.3 .2 How to deal with viruses

5.4 Introduction to Mabir worms

5.5 Introduction to Skulls series viruses

5.6 Case study: Basic principles of mobile phone worms

5.6.1 Background introduction

5.6.2 Tools and uses for writing worms

5.6.3 Symbian application initialization process

5.6.4 Source code explanation

5.6.5 Basic methods of virus removal

Chapter 6 Dangerous flashing and mobile phone upgrade

6.1 The concept of flashing

6.2 Hidden dangers caused by flashing

6.3 The concept of mobile phone system upgrade

6.4 Hidden dangers caused by upgrading

6.5 Case study: mobile phone flashing experiment

6.5.1 Experimental Tools

6.5.2 Experimental Process

Chapter 7: Bundled Mobile Phone Virus Hidden in the Thread

7.1 What is File Bundling

7.2 Preliminary understanding of SIS format

7.3 Disassemble SIS files

7.4 Basic implementation of SIS bundled viruses

7.5 Bundled viruses Characteristics and hazards

7.6 Identification and prevention of bundled viruses'

Chapter 8 The emergence of mobile phone rogue software

8.1 Introduction to the background of rogue software

8.2 Classification of rogue software and its malicious behavior

8.3 Harm of rogue software

8.4 Case study: analysis of a typical rogue software

8.4. 1 Malicious software infection process

8.4.2 Malicious software removal method

Chapter 9 Rootkit on mobile phones

9.1 Rootkit technology

9.2 File Hiding

9.3 Task/Thread Hiding

9.4 Driver-Level Rootkit

9.5 Demons Hiding in Hardware

9.6 Mobile Phones Analysis of the future development trend of Rootkit

Prevention

Chapter 10: Methods of discovering mobile phone viruses

10.1 Checking the self-starting method of mobile phones

10.2 Mobile phone file system check

10.3 Mobile phone running task check

10.4 Mobile phone network check

10.5 Mobile phone function check

Chapter 11 Mobile Phone Viruses Reverse analysis

11.1 Introduction to reverse engineering technology

11.2 ARM assembly language

11.2.1 ARM company and ARM-based embedded systems

11.2.2 ARM programming model

11.2.3 Memory format of ARM architecture

11.2.4 Register usage in ARM state

11.2.5 ARM Command system and addressing method

11.3 IDA Pro

11.4 Reverse analysis of Kapol virus

Chapter 12 Introduction to mainstream mobile anti-virus software

p>

12.1 F-Secure

12.2 Kaspersky Anti-Virus Software

12.3 Symantec Mobile Anti-Virus Software

12.4 McCafé Mobile Anti-Virus

1

2.5 Xiaohongsan AntiVirMobile

12.6 BitDefender Mobile Security

12.7 NetQin Mobile Antivirus Software

12.8 Rising Antivirus Software

12.9 Kingsoft Antivirus Mobile version

12.10 Jiangmin anti-virus software

12.11 Guanghua mobile anti-virus software

12.12 Disadvantages of mobile anti-virus software

……