This document discusses how mobile apps can be hacked and provides tips to develop more secure apps. It notes that apps are hackable if users have root access to their devices. Various tools for hacking apps like apktool, dex2jar, and jadx are listed. The document recommends techniques like using an obfuscator, encrypting data and resources, implementing integrity protection, and detecting tampering to make apps harder to reverse engineer and repackage. It emphasizes moving critical logic to native code, using SSL, minimizing stored data, and not trusting apps.
Presented during Droidcon.de 2015 barcamp session.
Hacking Android to get a notification when your app is being uninstalled. Mixing JNI and native C code to do something that was never meant to be done ;-)
Advanced Mac Software Deployment and Configuration: Just Make It Work!Timothy Sutton
This presentation was given at the Mac Admin & Developer Conference UK in February 2017. Session description follows:
You’re dealing with terrible installer packages, applications that perform ad-hoc system setup tasks and assume every user is an admin. It seems so often they were never tested in multi-user or enterprise environments. Your colleagues wonder “How hard could this be? At home I just install it and it works,” and they roll their eyes as you bemoan the sad realities of deploying desktop software.
This session will explore techniques for identifying the causes of these issues, and how to approach the various problems systematically to develop solutions. In no particular order, we’ll visit Bash, Python, packaging, launchd, configuration profiles, defaults, and the Hopper Disassembler.
Presented during Droidcon.de 2015 barcamp session.
Hacking Android to get a notification when your app is being uninstalled. Mixing JNI and native C code to do something that was never meant to be done ;-)
Advanced Mac Software Deployment and Configuration: Just Make It Work!Timothy Sutton
This presentation was given at the Mac Admin & Developer Conference UK in February 2017. Session description follows:
You’re dealing with terrible installer packages, applications that perform ad-hoc system setup tasks and assume every user is an admin. It seems so often they were never tested in multi-user or enterprise environments. Your colleagues wonder “How hard could this be? At home I just install it and it works,” and they roll their eyes as you bemoan the sad realities of deploying desktop software.
This session will explore techniques for identifying the causes of these issues, and how to approach the various problems systematically to develop solutions. In no particular order, we’ll visit Bash, Python, packaging, launchd, configuration profiles, defaults, and the Hopper Disassembler.
Real case: migrate from Web Forms to ASP.NET Core graduallyAndrea Dottor
Many application are developed in Web Forms and cannot be automatically converted to ASP.NET Core. Wait for rewrite all application in many case are impossible.
In this session are explained a way to gradually migrate to the new tecnology, and all the tricks for run the applications side by side (during the migration). And only when all are complete, dismiss the old. A real world case.
These are the slides presented for the Software Testing Philippines meet up last August 9, 2017 at the Orange and Bronze facility in Makati City.
The topic introduced the attendees to Vulnerability Scanning teaching them how to use OWASP ZAP and YASCA in the process.
Thanks to my mentor Benjie Zamora for the content and guidance that put together the content of the discussion. Thanks as well to the support of Voyager Innovations Inc.
In this Sensu Summit 2019 ecosystem session, Garrett Honeycutt, Principal at Tailored Automation, shares where we are with the Puppet module for managing Sensu and discusses the changes to the module and how users can migrate from Sensu Classic to Sensu Go. He also shows off all the testing surrounding the Puppet module and how they able to uncover issues and contribute back to the Sensu-go project during the GA release (and how that continues).
YouTube Link: https://youtu.be/eGBgmcG7HqI
** Edureka Python Certification Training (Use Code: YOUTUBE20) - https://www.edureka.co/data-science-python-certification-course**
This Edureka PPT on 'Python Visual Studio Code' will help you understand how you can use the Python extension to write python code in the visual studio code editor.
Follow us to never miss an update in the future.
YouTube: https://www.youtube.com/user/edurekaIN
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Castbox: https://castbox.fm/networks/505?country=in
Embedded application is a software application, basically written to control the devices or machines. DT offers a range of embedded software development services in the domain of embedded product.
Embedded software development using BDDItamar Hassin
This presentation makes the case for BDD in general and focuses on its use within embedded software development. Using the Cucumber gem, I will demonstrate how to use feature files in the context of working with embedded hardware projects, and explain how to extend the framework using the Wire protocol to allow integration tests to run in-situ, which greatly enhances testing coverage compared to PC-based testing using emulators.
I also cover the notion of a SpecFlow gateway, with which one can achieve end-to-end testing with a variety of devices as an orchestration mechanism for broader tests.
As developers we write code everyday, only to frown at it a week after that. Why do we have such a hard time with code written by others and ourselves, this raging desire to rewrite everything we see? Writing code that survives the test of time and self judgment is a matter of clarity and simplicity. Let's talk about growing, learning and improving our code with calisthenics, readability and good design.
Effective performance engineering is a critical factor in delivering meaningful results. The implementation must be built into every aspect of the business, from IT and business management to internal and external customers and all other stakeholders. Convetit brought together ten experts in the field of performance engineering to delve into the trends and drivers that are defining the space. This Foresights discussion will directly influence Business and Technology Leaders that are looking to stay ahead of the challenges they face with delivering high performing systems to their end users, today and in the next 2-5 years.
Ember.js is an opinionated web framework, that allows developers to focus less on boilerplate, and focus more on what makes their app unique. We'll go over some of the best practices of using Ember for cross-device development, and then build an app from a single codebase that produces a standalone desktop app, an in-browser web app and an iOS/Android app.
Along the way we'll cover:
* A high level overview of the Ember.js ecosystem, including build tools and "add-ons"
* Recent improvements to Ember's view layer, and the ramifications on mobile performance
* Best practices for tooling & build pipelines, to maintain your cross-device compatibility
The timing behavior of the OS must be predictable - services of the OS: Upper bound on the execution time!
2. OS must manage the timing and scheduling
OS possibly has to be aware of task deadlines;
(unless scheduling is done off-line).
3. The OS must be fast
Real case: migrate from Web Forms to ASP.NET Core graduallyAndrea Dottor
Many application are developed in Web Forms and cannot be automatically converted to ASP.NET Core. Wait for rewrite all application in many case are impossible.
In this session are explained a way to gradually migrate to the new tecnology, and all the tricks for run the applications side by side (during the migration). And only when all are complete, dismiss the old. A real world case.
These are the slides presented for the Software Testing Philippines meet up last August 9, 2017 at the Orange and Bronze facility in Makati City.
The topic introduced the attendees to Vulnerability Scanning teaching them how to use OWASP ZAP and YASCA in the process.
Thanks to my mentor Benjie Zamora for the content and guidance that put together the content of the discussion. Thanks as well to the support of Voyager Innovations Inc.
In this Sensu Summit 2019 ecosystem session, Garrett Honeycutt, Principal at Tailored Automation, shares where we are with the Puppet module for managing Sensu and discusses the changes to the module and how users can migrate from Sensu Classic to Sensu Go. He also shows off all the testing surrounding the Puppet module and how they able to uncover issues and contribute back to the Sensu-go project during the GA release (and how that continues).
YouTube Link: https://youtu.be/eGBgmcG7HqI
** Edureka Python Certification Training (Use Code: YOUTUBE20) - https://www.edureka.co/data-science-python-certification-course**
This Edureka PPT on 'Python Visual Studio Code' will help you understand how you can use the Python extension to write python code in the visual studio code editor.
Follow us to never miss an update in the future.
YouTube: https://www.youtube.com/user/edurekaIN
Instagram: https://www.instagram.com/edureka_learning/
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Castbox: https://castbox.fm/networks/505?country=in
Embedded application is a software application, basically written to control the devices or machines. DT offers a range of embedded software development services in the domain of embedded product.
Embedded software development using BDDItamar Hassin
This presentation makes the case for BDD in general and focuses on its use within embedded software development. Using the Cucumber gem, I will demonstrate how to use feature files in the context of working with embedded hardware projects, and explain how to extend the framework using the Wire protocol to allow integration tests to run in-situ, which greatly enhances testing coverage compared to PC-based testing using emulators.
I also cover the notion of a SpecFlow gateway, with which one can achieve end-to-end testing with a variety of devices as an orchestration mechanism for broader tests.
As developers we write code everyday, only to frown at it a week after that. Why do we have such a hard time with code written by others and ourselves, this raging desire to rewrite everything we see? Writing code that survives the test of time and self judgment is a matter of clarity and simplicity. Let's talk about growing, learning and improving our code with calisthenics, readability and good design.
Effective performance engineering is a critical factor in delivering meaningful results. The implementation must be built into every aspect of the business, from IT and business management to internal and external customers and all other stakeholders. Convetit brought together ten experts in the field of performance engineering to delve into the trends and drivers that are defining the space. This Foresights discussion will directly influence Business and Technology Leaders that are looking to stay ahead of the challenges they face with delivering high performing systems to their end users, today and in the next 2-5 years.
Ember.js is an opinionated web framework, that allows developers to focus less on boilerplate, and focus more on what makes their app unique. We'll go over some of the best practices of using Ember for cross-device development, and then build an app from a single codebase that produces a standalone desktop app, an in-browser web app and an iOS/Android app.
Along the way we'll cover:
* A high level overview of the Ember.js ecosystem, including build tools and "add-ons"
* Recent improvements to Ember's view layer, and the ramifications on mobile performance
* Best practices for tooling & build pipelines, to maintain your cross-device compatibility
The timing behavior of the OS must be predictable - services of the OS: Upper bound on the execution time!
2. OS must manage the timing and scheduling
OS possibly has to be aware of task deadlines;
(unless scheduling is done off-line).
3. The OS must be fast
Emerging technology trends for libraries for 2017David King
Technology has changed the face of libraries, and is continuing to change how we work and how we deliver services to customers. This workshop introduces emerging technology trends and shows how those trends are reshaping library services. Examples are provided of how to incorporate these evolving trends into libraries. Attendees learn what trends to look for, find out the difference between a technology trend and a fad, and get ideas on how their library can respond to technology as it emerges.
What Is the Future of Data Sharing? - Consumer Mindsets and the Power of BrandsDavid Rogers
READ an OVERVIEW: https://www.linkedin.com/pulse/new-research-what-future-data-sharing-david-rogers
This research study was produced by Columbia Business School’s Center on Global Brand Leadership, in conjunction with the Aimia Institute.
As data becomes an increasingly important asset for any business, access to accurate data from customers—about their interests, behaviors, and identity—is vital to successful, durable relationships. Our research explores how businesses can make data sharing a “win-win” for both companies and the customers they serve.
Co-authors David Rogers and Matthew Quint surveyed attitudes towards sharing data with business in six different industries, talking with 8,000 consumers from the US, UK, Canada, France, and India.
Our surprising findings show that even consumers who are actively protective of their data are often happy to share it for relevant offers and value. The study revealed four distinct “mindsets” that consumers have towards sharing data. And we uncovered clear opportunities for business to use data to add more value to their relationships with consumers.
With the big delays in the time it takes until an iOS jailbreak is public and stable, it is often not possible to test mobile apps in the latest iOS version. Occasionally customers might also provide builds that only work in iOS versions for which no jailbreak is available. On Android the situation is better, but there can also be problems to root certain phone models. These trends make security testing of mobile apps difficult. This talk will cover approaches to defeat common security mechanisms that must be bypassed in the absence of root/jailbreak.
Android application Pentesting with DIVA. This Course is Divided into three main sections:
1) Prepare your envirnment (Setup Kali Linux and Andriod Emulator)
2) Infomation Gathering (Attack surface)
3) Exploitation
Tools used:
1. Adb
2. Apktool
3. unzip
4. Dex2jar
5. JD-GUI
6. sqlitebrowser
7. Drozer
8. Cutter
I hope you find this session interesting. Thanks for joining !!
This talk is going to give an overview of Android operating system and it´s apps ecosystem from the security point of view of a penetration tester.
So lets dive into topics like Pentest Environment Setup, Tools of the Trade, App Analysis and some security hints for Android developers.
Slides from my beginner level talk on FRIDA and its usage while Pentesting Android Applications. Covers topics like Installation of Frida and Bypassing Pinning and Root Detection using Frida.
Boquet manager is one of my many pet projects, goal was to develop a desktop application which can read and edit xml files , which the manually use copy to satellite receiver Dbox2.
Mobile applications Development - Lecture 9
LAB
PhoneGap Development Environment
Debugging PhoneGap Applications
This presentation has been developed in the context of the Mobile Applications Development course at the Computer Science Department of the University of L’Aquila (Italy).
http://www.di.univaq.it/malavolta
The workshop will also provide a thorough guide on how the mobile applications can be attacked and provide an overview of how some of the most important security checks for the applications are applied and get an in-depth understanding of these security checks.
Course Content:
Android Introduction & Basics
Setting up the Pen testing environment
Reverse engineering & runtime manipulation
Application dynamic runtime analysis
Application Components and security issues
Data and Network interception – manipulation and analysis
Defensive Tools & Techniques for Android application
Ionic - Revolutionizing Hybrid Mobile Application DevelopmentJustin James
It has never been easier to build hybrid applications by using the Ionic Framework with technology that you already know and love such as AngularJS and Html 5. You will learn to love mobile development again.
Null Mumbai Meet_Android Reverse Engineering by Samrat Dasnullowaspmumbai
Android Reverse Engineering by Samrat Das
Abstract
• Intro to Reverse Engineering
• Short walkthough with Windows RE
• Introduction to Mobile Security Assessments
• Dalvik Virtual Machine vs JVM
• APK Walkthrough
• Components of Android
• Steps of Reverse Engineering Android Applications
• Hands-on demos on manual reversing of android apps
• Introduction to APPuse VM for droid assessments
• Detecting developer backdoors
• Creating Infected Android Applications
• Anti-Reversing | Obfuscation
Cloud Apps - Running Fully Distributed on Mobile Devices - Dominik Rüttimanndistributed matters
The move towards the cloud and towards low powered mobile devices has led to a decline of rich clients, i.e. most apps today are heavily dependent on their home server and thus a stable Internet connection. There are some approaches for local caching of data, however the concrete synchronization mechanism is often intransparent or difficult to control for users. Developers usually need to use different data structures on mobile devices and their cloud servers, thus leading to a multiplication of the code base involved. Meanwhile mobile chip architectures have caught up in performance such that the heavy reliance on the server has become more and more questionable. As an answer to this discrepancy, the Cloud Innovation Team of ATEGRA AG has been developing a fully distributed PaaS called Protogrid. It is based on CouchDB Servers located in the cloud, on premise and even running directly on mobile devices. The Protogrid development environment supports Rapid Application Development, such that a workflow application can be created and deployed offhandedly in a few minutes. Since all client logic is completely independent of the database schema, adaption to new requirements during operation is no issue. All Protogrid Apps can be deployed on various platforms without any additional effort and they are usable offline with no loss of functionality. In particular, this talk will cover experiences and earned knowledge during the implementation of Couchbase Lite and CouchDB replication on mobile clients as well as our innovative approach regarding the database schema in a NoSQL context.
Das neue Android Build System ist angetreten, um viele Probleme der Vergangenheit zu lösen. Mit Gradle als Basis, einem komplexen Plug-in speziell für Android und einer tiefen Integration in Android Studio kann man schon von einem "Next Generation" Build-System sprechen. Doch was bringt die neue Technologie in der Praxis, und wie kann ich die neuen Features in meinem Entwicklungsprozess nutzen?
Wir zeigen praktische Beispiele vom Projekt-Setup über den Build-Prozess und Konfigurationsmanagement bis hin zur CI-Integration sowie Erfahrungen mit der Migration existierender Projekte. Source Code: https://github.com/dhelleberg/androidgradlesample
Android app development is still holding the reins of the market. If your preferred android app development company utilizes the tools elucidated here, your next project will be a guaranteed success.
Similar to Is Your App Hackable for droidcon Berlin 2015 (20)
Cyaniclab : Software Development Agency Portfolio.pdfCyanic lab
CyanicLab, an offshore custom software development company based in Sweden,India, Finland, is your go-to partner for startup development and innovative web design solutions. Our expert team specializes in crafting cutting-edge software tailored to meet the unique needs of startups and established enterprises alike. From conceptualization to execution, we offer comprehensive services including web and mobile app development, UI/UX design, and ongoing software maintenance. Ready to elevate your business? Contact CyanicLab today and let us propel your vision to success with our top-notch IT solutions.
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
Even though at surface level ‘java.lang.OutOfMemoryError’ appears as one single error; underlyingly there are 9 types of OutOfMemoryError. Each type of OutOfMemoryError has different causes, diagnosis approaches and solutions. This session equips you with the knowledge, tools, and techniques needed to troubleshoot and conquer OutOfMemoryError in all its forms, ensuring smoother, more efficient Java applications.
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Shahin Sheidaei
Games are powerful teaching tools, fostering hands-on engagement and fun. But they require careful consideration to succeed. Join me to explore factors in running and selecting games, ensuring they serve as effective teaching tools. Learn to maintain focus on learning objectives while playing, and how to measure the ROI of gaming in education. Discover strategies for pitching gaming to leadership. This session offers insights, tips, and examples for coaches, team leads, and enterprise leaders seeking to teach from simple to complex concepts.
Check out the webinar slides to learn more about how XfilesPro transforms Salesforce document management by leveraging its world-class applications. For more details, please connect with sales@xfilespro.com
If you want to watch the on-demand webinar, please click here: https://www.xfilespro.com/webinars/salesforce-document-management-2-0-smarter-faster-better/
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
Enterprise Resource Planning System includes various modules that reduce any business's workload. Additionally, it organizes the workflows, which drives towards enhancing productivity. Here are a detailed explanation of the ERP modules. Going through the points will help you understand how the software is changing the work dynamics.
To know more details here: https://blogs.nyggs.com/nyggs/enterprise-resource-planning-erp-system-modules/
Navigating the Metaverse: A Journey into Virtual Evolution"Donna Lenk
Join us for an exploration of the Metaverse's evolution, where innovation meets imagination. Discover new dimensions of virtual events, engage with thought-provoking discussions, and witness the transformative power of digital realms."
How Recreation Management Software Can Streamline Your Operations.pptxwottaspaceseo
Recreation management software streamlines operations by automating key tasks such as scheduling, registration, and payment processing, reducing manual workload and errors. It provides centralized management of facilities, classes, and events, ensuring efficient resource allocation and facility usage. The software offers user-friendly online portals for easy access to bookings and program information, enhancing customer experience. Real-time reporting and data analytics deliver insights into attendance and preferences, aiding in strategic decision-making. Additionally, effective communication tools keep participants and staff informed with timely updates. Overall, recreation management software enhances efficiency, improves service delivery, and boosts customer satisfaction.
A Comprehensive Look at Generative AI in Retail App Testing.pdfkalichargn70th171
Traditional software testing methods are being challenged in retail, where customer expectations and technological advancements continually shape the landscape. Enter generative AI—a transformative subset of artificial intelligence technologies poised to revolutionize software testing.
Accelerate Enterprise Software Engineering with PlatformlessWSO2
Key takeaways:
Challenges of building platforms and the benefits of platformless.
Key principles of platformless, including API-first, cloud-native middleware, platform engineering, and developer experience.
How Choreo enables the platformless experience.
How key concepts like application architecture, domain-driven design, zero trust, and cell-based architecture are inherently a part of Choreo.
Demo of an end-to-end app built and deployed on Choreo.
Listen to the keynote address and hear about the latest developments from Rachana Ananthakrishnan and Ian Foster who review the updates to the Globus Platform and Service, and the relevance of Globus to the scientific community as an automation platform to accelerate scientific discovery.
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxrickgrimesss22
Discover the essential features to incorporate in your Winzo clone app to boost business growth, enhance user engagement, and drive revenue. Learn how to create a compelling gaming experience that stands out in the competitive market.
Experience our free, in-depth three-part Tendenci Platform Corporate Membership Management workshop series! In Session 1 on May 14th, 2024, we began with an Introduction and Setup, mastering the configuration of your Corporate Membership Module settings to establish membership types, applications, and more. Then, on May 16th, 2024, in Session 2, we focused on binding individual members to a Corporate Membership and Corporate Reps, teaching you how to add individual members and assign Corporate Representatives to manage dues, renewals, and associated members. Finally, on May 28th, 2024, in Session 3, we covered questions and concerns, addressing any queries or issues you may have.
For more Tendenci AMS events, check out www.tendenci.com/events
May Marketo Masterclass, London MUG May 22 2024.pdfAdele Miller
Can't make Adobe Summit in Vegas? No sweat because the EMEA Marketo Engage Champions are coming to London to share their Summit sessions, insights and more!
This is a MUG with a twist you don't want to miss.
15. don’t trust your app
u process on the backend as web developers do
u move critical business logic to native code
u use SSL
u no plain text data
u minimize data stored on the device
16. proguard is essential
open source
http://proguard.sourceforge.net/
u shrinks and optimizes the code
u renames classes, methods, etc
17.
18. Security and Design, http://developer.android.com/google/play/billing/billing_best_practices.html
20. protection goals
u Have bytecode as hard to reverse engineer as possible.
u Have strong integrity protection mechanism in order to block
repackaging ability.
u Have data and resources encrypted.
22. mobile security market
u
u class encryption
u resource encryption
u hiding of API calls
u integrity protection
u tamper detection
u clone protection
u root detection
u mobile
application/device
management
u rich policy control
u custom business
requirements
u fingerprinting
u integration with fraud
monitoring systems
u …
basic professional enterprise
23.
24. 1. unzip your app_1.2.3.apk from
2. copy some picture.png to assets
3. zip & sign it back
4. works?
quick check
25. next steps
u include security into your development workflow
u do not trust your own app
u use cryptography standards
u stay informed: books, sessions, hacker tools
contacts
@dexprotector
dexprotector@licelus.com
// And my own
@kalabro
marshalkina@licelus.com