Books and papers I read,want to read,will read when have time, want to read again, I liked, I loved...
The Tangled Web - Michal Zalewski
The Mobile Application Hacker's Handbook - Shaun Colley, Tyrone Erasmus, Dominic Chell, Ollie Whitehouse
Android Security Internals - Nikolay Elenkov
Android Hacker's Handbook - Joshua J. Drake, Georg Wicherski, Pau Oliva Fora, Collin Mulliner, Stephen A. Ridley, Zach Lanier
Practical Binary Analysis - Dennis Andriesse
Real-World Bug Hunting - Peter Yaworski
Rootkits and Bootkits - Eugene Rodionov, Alex Matrosov, Sergey Bratus
Practical Malware Analysis - Michael Sikorski, Andrew Honig
Black Hat Python - Justin Seitz
Hacking: The Art of Exploitation - Jon Erickson
Attacking Network Protocols - James Forshaw
Serious Cryptography - Jean-Philippe Aumasson
ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android - Raphael Spreitzer, Felix Kirchengast, Daniel Gruss, and Stefan Mangard
SCAnDroid: Automated Side-Channel Analysis of Android APIs - Raphael Spreitzer, Gerald Palfinger, Stefan Mangard
AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies - Mordechai Guri, Gabi Kedma, Assaf Kachlon, Yuval Elovici
Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers - Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici
GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies - Mordechai Guri, Assaf Kachlon, Ofer Hasson, Gabi Kedma, Yisroel Mirsky, and Yuval Elovici
MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped Computers using Speaker-to-Speaker Communication - Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici
Data Exfiltration from Air-Gapped Computers based on ARM CPU - Kenta Yamamoto, Miyuki Hirose, Taiichi Saito