Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Core Tech

droidcon NYC '19: Shielding Your Android App from Attackers

droidcon NYC 2019 | Shielding Your Android App from Attackers | Peter Tefft

droidcon NYC - Pluralsight course - droidcon NYC '19: Shielding Your Android App from Attackers
droidcon NYC
What you'll learn

Android apps run in an untrusted environment and are, therefore, susceptible to reverse engineering, probing, and tampering. These attacks can result in your intellectual property being stolen or in compromised versions of your app being distributed, compromising user data and causing reputational damage. In this talk, Peter Tefft examines ways in which an attacker might approach your application and countermeasures that you can take to make their job much more difficult. In particular, Peter will discuss renaming elements of your code, employing control flow obfuscation, using string encryption in order to make your code more difficult for an attacker to navigate, and using checks to verify the safety of the environment in which your app is running and how to react accordingly if it is running in an unsafe environment.

Table of contents

About the author
droidcon NYC - Pluralsight course - droidcon NYC '19: Shielding Your Android App from Attackers
droidcon NYC

Droidcon New York is where the industry's leading Android experts converge to support the Android platform and create a strong network for developers and companies.

Get access now

Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere.

Get started with Pluralsight