Menu
Contents
Contents
  1. Start
  2. Introduction
  1. Principles

    Overview
  2. The big picture
  3. What needs protecting
  4. Develop a threat model for your application
  5. The four layers of mobile application protection
  1. Threats

    Overview
  2. Decompilation and modification
  3. Dynamic analysis and tampering
  4. Emulators and Virtualization Apps
  5. Malware
  6. Network communications interception
  7. Mobile app fraud
  1. Practice

    Overview
  2. Mobile app protection checklist
  3. Continuous security
  1. Summary

A guide to mobile application protection

This is a guide to protecting mobile apps - and their users - against the threats they're facing today. It's designed to give an overview of how attackers target applications and how you can combat them effectively.