We may earn an affiliate commission when you visit our partners.
Course image
droidcon NYC
Android apps run in an untrusted environment and are, therefore, susceptible to reverse engineering, probing, and tampering. These attacks can result in your intellectual property being stolen or in compromised versions of your app being distributed, compromising user data and causing reputational damage. In this talk, Peter Tefft examines ways in which an attacker might approach your application and countermeasures that you can take to make their job much more difficult. In particular, Peter will discuss renaming elements of your code, employing control flow obfuscation, using string encryption in order to make your code more...
Read more
Android apps run in an untrusted environment and are, therefore, susceptible to reverse engineering, probing, and tampering. These attacks can result in your intellectual property being stolen or in compromised versions of your app being distributed, compromising user data and causing reputational damage. In this talk, Peter Tefft examines ways in which an attacker might approach your application and countermeasures that you can take to make their job much more difficult. In particular, Peter will discuss renaming elements of your code, employing control flow obfuscation, using string encryption in order to make your code more difficult for an attacker to navigate, and using checks to verify the safety of the environment in which your app is running and how to react accordingly if it is running in an unsafe environment.
Enroll now

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Examines the risk of android apps being probed, tampered, and reverse engineered
Taught by droidcon experts

Save this course

Save droidcon NYC '19: Shielding Your Android App from Attackers to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for droidcon NYC '19: Shielding Your Android App from Attackers. These are activities you can do either before, during, or after a course.

Career center

Learners who complete droidcon NYC '19: Shielding Your Android App from Attackers will develop knowledge and skills that may be useful to these careers:
Vulnerability Assessor
Vulnerability Assessors identify and assess vulnerabilities in computer systems and networks. This course will help you to understand the threats faced by Android apps and how to mitigate these threats.
Security Engineer
Security Engineers design, implement, and manage security systems to protect organizations from cyber attacks. This course will help you to understand the threats faced by Android apps and how to mitigate these threats.
Cybersecurity Analyst
Cybersecurity Analysts plan, implement, and manage the security of computer systems and networks. This course will help you to understand the threats faced by Android apps and how to mitigate these threats.
Incident Responder
Incident Responders investigate and respond to security incidents. This course will help you to understand the threats faced by Android apps and how to mitigate these threats.
Information Security Manager
Information Security Managers are responsible for the overall security of an organization's information systems and data. This course will help you to understand the threats faced by Android apps and how to mitigate these threats.
Privacy Officer
Privacy Officers are responsible for protecting the privacy of an organization's data. This course will help you to understand the privacy risks faced by Android apps and how to mitigate these risks.
Chief Information Security Officer
Chief Information Security Officers are responsible for the overall security of an organization's information systems and data. This course will help you to understand the threats faced by Android apps and how to mitigate these threats.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course will help you to understand the threats faced by Android apps and how to mitigate these threats.
Risk Analyst
Risk Analysts identify, assess, and manage risks to organizations. This course will help you to understand the risks faced by Android apps and how to mitigate these risks.
Fraud Analyst
Fraud Analysts investigate and prevent fraud. This course will help you to understand the threats faced by Android apps and how to mitigate these threats.
Software Engineer
Software Engineers are responsible for designing, developing, and testing software applications. This course will help you to understand how to protect your software applications from attack.
Data Analyst
Data Analysts collect, clean, and analyze data to help businesses make informed decisions. This course will help you to understand how to protect your data from unauthorized access.
Database Administrator
Database Administrators are responsible for the maintenance and security of databases. This course will help you to understand how to protect your databases from unauthorized access.
Compliance Auditor
Compliance Auditors ensure that organizations comply with laws and regulations. This course will help you to understand the regulatory requirements for Android apps and how to ensure compliance.
Android Developer
An Android Developer is in charge of designing, coding, testing, and releasing applications that run on Android devices. This course may be useful to you if you're looking to ensure the security of your Android applications.

Reading list

We haven't picked any books for this reading list yet.
Comprehensive guide to Android development for all levels of experience. It covers everything from the basics to advanced topics such as creating custom views and working with fragments.
Concise guide to advanced Android development topics. It covers topics such as performance optimization, memory management, and security.
Beginner-friendly guide to Android development using Kotlin. It covers all of the basics, from setting up your development environment to creating your first apps.
Guide to using Jetpack, a set of libraries that make it easier to develop Android apps. It covers all of the basics, from setting up your environment to using the most popular Jetpack libraries.
Collection of recipes for common Android development tasks. It covers a wide range of topics, from working with the UI to networking and data storage.
Suitable for security practitioners and app developers, this book offers practical guidance on securing mobile applications throughout the development lifecycle.
A collection of articles providing insights into various aspects of mobile app security, including secure software development, threat modeling, and security testing.
Focuses specifically on Android security, providing an in-depth look at the security architecture and implementation of the Android platform.
Specifically aimed at Android malware analysis, providing a deep understanding of the techniques used by malware authors and how to detect and analyze malicious code.
Focuses on secure coding practices for mobile app development, helping developers avoid common vulnerabilities and implement secure code.
An introduction to mobile app security for beginners, covering basic concepts and best practices.
Save
Covers various approaches to reverse engineering, providing a broad overview for those with some programming experience who want to learn about reverse engineering.
Provides a comprehensive overview of reverse engineering, covering various techniques and tools.
Comprehensive guide to IDA Pro, one of the most popular disassemblers used in reverse engineering.
Teaches reverse engineering using IDA Pro, with a focus on practical techniques.
Provides a comprehensive overview of reverse engineering techniques for software analysis.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser