Course
Skills Expanded
droidcon NYC '19: Reverse-engineering Apps on the Device - How Far Can We Go?
droidcon NYC 2019 | Reverse-engineering Apps on the Device - How Far Can We Go? | Jeb Ware
What you'll learn
In this talk, Jeb Ware walks through the APIs that expose your resources, shows how to put them into action, and demonstrates how to inspect and even execute another app's code. You will gain a better understanding of what is and is not protected by the Android Application Sandbox, and which parts of your app are freely available for reverse-engineering.
Table of contents
Reverse-engineering Apps on the Device - How Far Can We Go?
21mins