Technical
Compiler-Based Mobile App Security vs. App Shielding and No-Code Mobile App Security
13 minute read | July 6, 2022Mobile application protection puts the necessary lock on the application package you release. It prevents brand damage and revenue loss from threats such as back-end abuse,...
Read MoreFilter by Topic
Technical
5 min read
| February 14, 2023
Why You Need Both Pentesting and Mobile App Security Testing
Read More
Technical
18 min read
| December 13, 2022
Phases of a Mobile App Attack, Part 2: The Attacker’s POV
Read More
Technical
13 min read
| November 15, 2022
Call Graphs: The Bread and Butter of Program Analysis
Read More
Android
15 min read
| November 2, 2022
How Development Skills Translate to Reverse Engineering: Using LLDB to Reverse Engineer an Android App
Read More
Technical
30 min read
| October 11, 2022
How Classical Attacks Apply to Flutter™ Apps
Read More
Technical
6 min read
| September 28, 2022
TrollStore Implications and Mitigations For Your iOS Application
Read More
Technical
10 min read
| September 13, 2022
The Four Phases of a Mobile Application Attack
Read More
Technical
12 min read
| July 27, 2022
Strings, Please! Eliminating Data Leaks Caused by Kotlin Assertions
Read More
Technical
29 min read
| June 29, 2022
Obstacles in Dart Decompilation & the Impact on Flutter™ App Security
Read More
Why You Need Both Pentesting and Mobile App Security Testing
https://www.guardsquare.com/blog/the-difference-between-mobile-app-security-testing-and-pen-testing-and-why-you-need-both
Phases of a Mobile App Attack, Part 2: The Attacker’s POV
https://www.guardsquare.com/blog/mobile-app-attack-phases-part-2
Call Graphs: The Bread and Butter of Program Analysis
https://www.guardsquare.com/blog/call-graphs-the-bread-and-butter-of-program-analysis
How Development Skills Translate to Reverse Engineering: Using LLDB to Reverse Engineer an Android App
https://www.guardsquare.com/blog/how-development-skills-translate-to-reverse-engineering
How Classical Attacks Apply to Flutter™ Apps
https://www.guardsquare.com/blog/how-classical-attacks-apply-to-flutter-apps
TrollStore Implications and Mitigations For Your iOS Application
https://www.guardsquare.com/blog/trollstore-mitigations-for-your-ios-application
The Four Phases of a Mobile Application Attack
https://www.guardsquare.com/blog/four-phases-of-a-mobile-application-attack
Strings, Please! Eliminating Data Leaks Caused by Kotlin Assertions
https://www.guardsquare.com/blog/eliminating-data-leaks-caused-by-kotlin-assertions
Obstacles in Dart Decompilation & the Impact on Flutter™ App Security
https://www.guardsquare.com/blog/obstacles-in-dart-decompilation-and-the-impact-on-flutter-app-security