If the app is publicly available, it can be run on an untrusted device that is under full control of the attacker. None of these measures can assure a 100% effectiveness, as the reverse engineer will always have full access to the device and will therefore always win (given enough time and resources)!įor example, preventing debugging is virtually impossible. The lack of any of these measures does not cause a vulnerability - instead, they are meant to increase the app's resilience against reverse engineering and specific client-side attacks. Android Anti-Reversing Defenses General Disclaimer
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |