Chapter 2: Protecting Your Code

In Chapter 2, we’ll look at how to download and reverse engineer an Android APK back into Java source in more detail. We’ll also cover how to best protect your code using different types of obfuscation tools and techniques that we’ve encountered during our audits. We’ll look at the implications of being able to disassemble your code into bytecode. And we’ll show how you can use the NDK to hide your algorithms and business rules.

Get Bulletproof Android™: Practical Advice for Building Secure Apps now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.