Reverse engineering mobile apps: how, why, and what now?

Day 2 /  / Track 2  /  EN / For practicing engineers

We live in an age when code and data are the cornerstones of billion-dollar companies. You’d be surprised, though, at how easy it is to hack your way into most apps and take whatever it is that their VC-worthy idea is built on.

In this talk we’d like to share with you how some attack vectors are exploited, advise you on how you can secure your app against them, and talk about the pitfalls you’ll encounter when trying to make your app as impenetrable as possible.


Download presentation