-
Principles
Overview - The big picture
- What needs protecting
- Develop a threat model for your application
- The four layers of mobile application protection
-
Threats
Overview - Decompilation and modification
- Dynamic analysis and tampering
- Emulators and Virtualization Apps
- Malware
- Network communications interception
- Mobile app fraud
A guide to mobile application protection
This is a guide to protecting mobile apps - and their users - against the threats they're facing today. It's designed to give an overview of how attackers target applications and how you can combat them effectively.