Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /home/public/wp-content/plugins/wordfence/models/block/wfBlock.php on line 536

Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /home/public/wp-content/plugins/wordfence/models/block/wfBlock.php on line 537

Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /home/public/wp-content/plugins/wordfence/models/block/wfBlock.php on line 539

Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /home/public/wp-content/plugins/wordfence/models/block/wfBlock.php on line 554

Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /home/public/wp-content/plugins/wordfence/models/block/wfBlock.php on line 557
Reverse Engineering Mobile Applications – kuemerle.com

Reverse Engineering Mobile Applications

Everybody is writing apps and many of us are not writing them well. Mobile applications can contain a number of security vulnerabilities, both common across many application styles as well as some that are unique to the mobile ecosystem. In this session we will learn the various techniques bad guys can use to extract information from your Android mobile applications, how that information can be used to compromise your systems or your users and how you can harden your applications to be more resistant.