Menu
Contents
Contents
  1. Start
  2. Introduction
  1. Principles

    Overview
  2. The big picture
  3. What needs protecting
  4. Develop a threat model for your application
  5. The four layers of mobile application protection
  1. Threats

    Overview
  2. Decompilation and modification
  3. Dynamic analysis and tampering
  4. Emulators and Virtualization Apps
  5. Malware
  6. Network communications interception
  7. Mobile app fraud
  1. Practice

    Overview
  2. Mobile app protection checklist
  3. Continuous security
  1. Summary

Guide Home Guide Home Principles

Before we examine in detail the threats facing your app, it’s worth exploring what attackers are actually targeting. We’ll also share some fundamental principles of mobile application protection.

Attackers target assets. And we can categorize these assets into three main types:

During the course of this guide we’ll focus on these assets, how attackers attempt to access and exploit them, and how you can prevent them from doing so.

Identifying how attackers seek to achieve their objectives will go a long way in helping you to create a threat model, which we’ll also cover in this section. Carry out this foundational process and you can put your app in a stronger position to defend itself against attacks of all kinds. To that end, we’ll also introduce what we consider to be the crucial four layers of mobile application protection.


In this section