- Course
droidcon NYC '19: Reverse-engineering Apps on the Device - How Far Can We Go?
droidcon NYC 2019 | Reverse-engineering Apps on the Device - How Far Can We Go? | Jeb Ware
- Course
droidcon NYC '19: Reverse-engineering Apps on the Device - How Far Can We Go?
droidcon NYC 2019 | Reverse-engineering Apps on the Device - How Far Can We Go? | Jeb Ware
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Core Tech
What you'll learn
In this talk, Jeb Ware walks through the APIs that expose your resources, shows how to put them into action, and demonstrates how to inspect and even execute another app's code. You will gain a better understanding of what is and is not protected by the Android Application Sandbox, and which parts of your app are freely available for reverse-engineering.