OS
      Products
      Topic Areas
      Industries
      Reset
      Phases of a Mobile App Attack, Part 2: The Attacker’s POV https://www.guardsquare.com/blog/mobile-app-attack-phases-part-2

      Call Graphs: The Bread and Butter of Program Analysis https://www.guardsquare.com/blog/call-graphs-the-bread-and-butter-of-program-analysis

      How Development Skills Translate to Reverse Engineering: Using LLDB to Reverse Engineer an Android App https://www.guardsquare.com/blog/how-development-skills-translate-to-reverse-engineering

      How Classical Attacks Apply to Flutter™ Apps https://www.guardsquare.com/blog/how-classical-attacks-apply-to-flutter-apps

      Strings, Please! Eliminating Data Leaks Caused by Kotlin Assertions https://www.guardsquare.com/blog/eliminating-data-leaks-caused-by-kotlin-assertions

      Obstacles in Dart Decompilation & the Impact on Flutter™ App Security https://www.guardsquare.com/blog/obstacles-in-dart-decompilation-and-the-impact-on-flutter-app-security

      The Current State & Future of Reverse Engineering Flutter™ Apps https://www.guardsquare.com/blog/current-state-and-future-of-reversing-flutter-apps

      Beyond Taint Analysis: Detecting Data Flows in Java Applications with ProGuardCORE https://www.guardsquare.com/blog/detecting-data-flows-in-java-applications-with-proguardcore

      Who You Gonna Call? Behind the Scenes of JVM Method Invocations https://www.guardsquare.com/blog/behind-the-scenes-of-jvm-method-invocations

      Keep Rules in the Age of Kotlin https://www.guardsquare.com/blog/keep-rules-in-the-age-of-kotlin