- Course
droidcon NYC '19: Shielding Your Android App from Attackers
droidcon NYC 2019 | Shielding Your Android App from Attackers | Peter Tefft
- Course
droidcon NYC '19: Shielding Your Android App from Attackers
droidcon NYC 2019 | Shielding Your Android App from Attackers | Peter Tefft
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Core Tech
What you'll learn
Android apps run in an untrusted environment and are, therefore, susceptible to reverse engineering, probing, and tampering. These attacks can result in your intellectual property being stolen or in compromised versions of your app being distributed, compromising user data and causing reputational damage. In this talk, Peter Tefft examines ways in which an attacker might approach your application and countermeasures that you can take to make their job much more difficult. In particular, Peter will discuss renaming elements of your code, employing control flow obfuscation, using string encryption in order to make your code more difficult for an attacker to navigate, and using checks to verify the safety of the environment in which your app is running and how to react accordingly if it is running in an unsafe environment.