Books and papers I read,want to read,will read when have time, want to read again, I liked, I loved...


The Tangled Web - Michal Zalewski

The Mobile Application Hacker's Handbook - Shaun Colley, Tyrone Erasmus, Dominic Chell, Ollie Whitehouse

Android Security Internals - Nikolay Elenkov

Android Hacker's Handbook - Joshua J. Drake, Georg Wicherski, Pau Oliva Fora, Collin Mulliner, Stephen A. Ridley, Zach Lanier

Practical Binary Analysis - Dennis Andriesse

Real-World Bug Hunting - Peter Yaworski

Rootkits and Bootkits - Eugene Rodionov, Alex Matrosov, Sergey Bratus

Practical Malware Analysis - Michael Sikorski, Andrew Honig

Black Hat Python - Justin Seitz

Hacking: The Art of Exploitation - Jon Erickson

Attacking Network Protocols - James Forshaw

Serious Cryptography - Jean-Philippe Aumasson


ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android - Raphael Spreitzer, Felix Kirchengast, Daniel Gruss, and Stefan Mangard

SCAnDroid: Automated Side-Channel Analysis of Android APIs - Raphael Spreitzer, Gerald Palfinger, Stefan Mangard

AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies - Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici

Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers - Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici

GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies - Mordechai Guri, Assaf Kachlon, Ofer Hasson, Gabi Kedma, Yisroel Mirsky, and Yuval Elovici

MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication - Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici

Data Exfiltration from Air-Gapped Computers based on ARM CPU - Kenta Yamamoto, Miyuki Hirose, Taiichi Saito