Chapter 5. Protecting Applications

In this chapter, we will cover the following recipes:

  • Securing application components
  • Protecting components with custom permissions
  • Protecting content provider paths
  • Defending against the SQL-injection attacks
  • Application signature verification (anti-tamper)
  • Tamper protection by detecting the installer, emulator, and debug flag
  • Removing all log messages with ProGuard
  • Advanced code obfuscation with DexGuard

Introduction

So far, we've seen how to set up and customize an environment to discover and take advantage of vulnerabilities in the Android apps. In this chapter, we are going to discuss several protection techniques to make it more difficult for reverse engineers and attackers.

One of the common mistakes while developing ...

Get Android Security Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.