droidcon NYC '19: Shielding Your Android App from Attackers

droidcon NYC 2019 | Shielding Your Android App from Attackers | Peter Tefft
Course info
Level
Beginner
Updated
Sep 20, 2019
Duration
33m
Table of contents
Shielding Your Android App from Attackers
Description
Course info
Level
Beginner
Updated
Sep 20, 2019
Duration
33m
Description

Android apps run in an untrusted environment and are, therefore, susceptible to reverse engineering, probing, and tampering. These attacks can result in your intellectual property being stolen or in compromised versions of your app being distributed, compromising user data and causing reputational damage. In this talk, Peter Tefft examines ways in which an attacker might approach your application and countermeasures that you can take to make their job much more difficult. In particular, Peter will discuss renaming elements of your code, employing control flow obfuscation, using string encryption in order to make your code more difficult for an attacker to navigate, and using checks to verify the safety of the environment in which your app is running and how to react accordingly if it is running in an unsafe environment.

About the author
About the author

Droidcon New York is where the industry's leading Android experts converge to support the Android platform and create a strong network for developers and companies.

More from the author
droidcon NYC '19: Invading the Home Screen
Intermediate
33m
Sep 20, 2019
More courses by droidcon NYC