Secure languages & frameworks
Richard S wrote us and asked what information we could offer regarding languages & frameworks that are more suitable for developing secure applications, along with what attributes differentiate them over their less secure counterparts.
- Number of organizations that use each framework or language for 'secure' applications
 - Availability & number of security elements built in to the core language / framework
 - Availability & number of 3rd party security elements built (can they be identified as trustworthy)
 - Number of vulnerabilities identified (per month, per year)
 - Time to fix
 
So bring it on: tell us via the comment form what works for you and why (don't hesitate to include favorite static/runtime analysis tools).
Honeynet Project: Android Reverse Engineering (A.R.E.) Virtual Machine released
Christian (@cseifert) of the Honeynet Project advised us that they've released A.R.E, the Android Reverse Engineering Virtual Machine.
This VirtualBox-ready VM includes the latest Android malware analysis tools as follows:
- Androguard
 - Android sdk/ndk
 - APKInspector
 - Apktool
 - Axmlprinter
 - Ded
 - Dex2jar
 - DroidBox
 - Jad
 - Smali/Baksmali
 
A.R.E. is freely available from http://redmine.honeynet.org/projects/are/wiki
Given the probable exponential growth in mobile malware, A.R.E. presents an opportunity to test, learn, and analyze.
              
Comments