Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehous (2015) Mobile Application Hacker's Handbook. Wiley. Available at: https://www.wiley.com/en-us/The+Mobile+Application+Hacker%27s+Handbook-p-9781118958506​
Joshua J. Drake, Zach Lanier, Collin Mulliner, Pau Oliva, Stephen A. Ridley, Georg Wicherski (2014) Android Hacker's Handbook. Wiley. Available at: https://www.wiley.com/en-us/Android+Hacker%27s+Handbook-p-9781118608647​
Godfrey Nolan (2014) Bulletproof Android. Addison-Wesley Professional. Available at: https://www.amazon.com/Bulletproof-Android-Practical-Building-Developers/dp/0133993329​
Nikolay Elenkov (2014) Android Security Internals: An In-Depth Guide to Android's Security Architecture. No Starch Press. Available at: https://nostarch.com/androidsecurity​
Jonathan Levin (2015) Android Internals :: A confectioners cookbook - Volume I: The power user's view. Technologeeks.com. Available at: http://newandroidbook.com/​
Charlie Miller, Dionysus Blazakis, Dino Dai Zovi, Stefan Esser, Vincenzo Iozzo, Ralf-Philipp Weinmann (2012) iOS Hacker's Handbook. Wiley. Available at: https://www.wiley.com/en-us/iOS+Hacker%27s+Handbook-p-9781118204122​
David Thiel (2016) iOS Application Security, The Definitive Guide for Hackers and Developers. no starch press. Available at: https://www.nostarch.com/iossecurity​
Jonathan Levin (2017), Mac OS X and iOS Internals, Wiley. Available at: http://newosxbook.com/index.php​
Bruce Dang, Alexandre Gazet, Elias Backaalany (2014) Practical Reverse Engineering. Wiley. Available at: https://www.wiley.com/en-us/Practical+Reverse+Engineering%3A+x86%2C+x64%2C+ARM%2C+Windows+Kernel%2C+Reversing+Tools%2C+and+Obfuscation-p-9781118787311​
Skakenunny, Hangcom iOS App Reverse Engineering. Online. Available at: https://github.com/iosre/iOSAppReverseEngineering/​
Bernhard Mueller (2016) Hacking Soft Tokens - Advanced Reverse Engineering on Android. HITB GSEC Singapore. Available at: http://gsec.hitb.org/materials/sg2016/D1%20-%20Bernhard%20Mueller%20-%20Attacking%20Software%20Tokens.pdf​
Dennis Yurichev (2016) Reverse Engineering for Beginners. Online. Available at: https://beginners.re/​
Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters (2014) The Art of Memory Forensics. Wiley. Available at: https://www.wiley.com/en-us/The+Art+of+Memory+Forensics%3A+Detecting+Malware+and+Threats+in+Windows%2C+Linux%2C+and+Mac+Memory-p-9781118825099​
Jacob Baines (2016) Programming Linux Anti-Reversing Techniques. Leanpub. Available at: https://leanpub.com/anti-reverse-engineering-linux​