Featured resource
pluralsight tech forecast
2025 Tech Forecast

Which technologies will dominate in 2025? And what skills do you need to keep up?

Check it out
Hamburger Icon
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Cloud

MUwS, PHA, Vulnerabilities: A Walk through on What Not to Do

Droidcon SF 2019 | MUwS, PHA, Vulnerabilities: A Walk through on What Not to Do | Salvador Mandujano

droidcon SF - Pluralsight course - MUwS, PHA, Vulnerabilities: A Walk through on What Not to Do
by droidcon SF

What you'll learn

Mobile unwanted software, potentially harmful applications, and vulnerabilities are three important threats that may impact the security and privacy of Android users if applications are not properly designed and implemented. As an Android developer, it is important to understand the practical risks that buggy code, untrusted SDKs, and limited disclosure to users represent in order to anticipate and prevent incidents with their apps. This session by the Google Play Protect reverse engineering team will analyze specific examples of application behaviors and code issues that may cause problems to users and developers in the three areas above, from data collection and dynamic code loading to the abuse of SMS functionality to commit fraud. The audience will learn how to prevent their Google Play or off-market application from being flagged as malicious by Google Play Protect, and how to make design choices that enhance the privacy of the user and the security of the data the application handles.

Table of contents

About the author

droidcon SF - Pluralsight course - MUwS, PHA, Vulnerabilities: A Walk through on What Not to Do
droidcon SF

droidcon SF is where the industry's leading Android experts converge to support the Android platform and create a strong network for developers and companies.

More Courses by droidcon