Summary

Building secure apps is always a great challenge for the developer community due to the plenty of considerations and attack surfaces with ever-growing platform versions and device hardware changes. In this chapter, we have learned how to secure any given mobile app on the device by protecting the binary, the data in transit, and the data at rest. We have also learned how to make it difficult for attackers in tampering the data within the app and device. We have taken a deep dive into different considerations in securing the app on Android and iOS and learned how to utilize the existing security features as a defense mechanism.

Finally, we have learned the common checklists for both Android and iOS based on the OWASP top 10, which can be ...

Get Mobile Application Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.