🎤 Discovering and mastering obfuscation on Android
- 👤 Renaud Boulard
- Twitter: @_renaudb
- GitHub: renaudboulard
📹
Video:
https://youtu.be/c0KZh_j_djQ
"Developing applications is good! Securing them is better ... And even more so if these applications handle sensitive or personal data. Protecting its applications against reverse-engineering is something that should be done systematically before opening to the general public: Unfortunately, this step is still too often neglected. While obfuscating its code allows, to make the understanding of your system more difficult for a third party, to avoid the theft of your intellectual property and to limit the leakage of information. The purpose of this presentation is to introduce you to the obfuscation of an SDK or an application, to introduce you to the different issues and to prove to you that activating proguard is not always synonymous with crash! François and Renaud will show you step by step and in a practical way how to obfuscate an application starting from scratch, while analyzing the result and the quality of it. More advanced techniques will also be presented, the aim being to make the most of the various tools available to us for free. The limit of free tools versus paid tools will also be discussed."
This page was generated from this YAML file. Found a typo, want to add some data? Just edit it on GitHub.