- Paperback: 304 pages
- Publisher: Apress; 1st ed. edition (July 12, 2012)
- Language: English
- ISBN-10: 1430242485
- ISBN-13: 978-1430242482
- Product Dimensions: 7.5 x 0.7 x 9.2 inches
- Shipping Weight: 1.5 pounds (View shipping rates and policies)
- Average Customer Review: 3 customer reviews
- Amazon Best Sellers Rank: #2,672,366 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Decompiling Android 1st ed. Edition
Use the Amazon App to scan ISBNs and compare prices.
About the Author
Godfrey Nolan is president of RIIS LLC, where he specializes in website optimization. He has written numerous articles for magazines and newspapers in the United States, the United Kingdom, and Ireland. Nolan has had a healthy obsession with reverse engineering bytecode since he wrote Decompile Once, Run Anywhere, which first appeared in Web Techniques in September 1997.
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
While I always enjoy learning new things, I do value my time. When I came across this book, I was elated. I realized that the many disparate pieces of information I needed had been assembled in a single tome.
The book gives an excellent overview of Java/Dalvik decompiles - past and present. While having the latest and greatest is nice - you learn to appreciate them more when you know the history and evolution of such tools.
It covers, in depth, the use of existing tools that - piece by piece - transform an Android APK into Java source code. This information alone would have been a huge time to anybody seeking knowledge on the deconstruction of Android apps.
Beyond the discussion of existing decompilers, the main focus of the book is on the creation of custom tools to add to your reverse engineering tool belt. The book meticulously documents the process of decompiling an app. The appendix, to my delight, also includes a list of all the Java and Dalvik bytecodes.
While it is great to understand how to take apart an APK, it brings to light how vulnerable apps can be. Luckily, the book includes a chapter dedicated to the discussion of how to protect an app. Included, are several case studies using several existing utilities. In addition, there is general discussion on protection schemes, such as layout, control, and data obfuscation.
The book is well written and technically accurate. I highly recommend it to anybody interested in reverse engineering or those looking into creating, and protecting, their own Android apps.
I have been developing for Android since 2009 and the topic of reverse engineering frequently emerges but I have never had time to properly research it. Thanks to this book, I feel I can confidently answer such questions and perhaps do a little reverse engineering myself if necessary. Well worth the price and time.
I enjoyed the topic and writing style/organization, and the author gives a nod to NELIAC (my first working language) as a bonus.
This book will not be for the average application developer, but if you are interested in android internals then I think you will not be disappointed.