Please log in to watch this conference skillscast.
We spend a lot of time putting apps together, but when was the last time you pulled one apart? How wonderful is it that Android is open-source, so we can simply look at the code when we need to? What if it were just as easy to look at the source code and behaviour of any other app? If we can streamline the process of looking inside a compiled application then we're more likely to employ it to answer questions and teach us valuable lessons we can apply to our work. We may learn from others and also make our own apps more secure. We can pinpoint bugs that come from closed-source libraries such as those for ad and tracking networks, and work around those bugs, get them fixed faster, or even patch them if need be. This talk will explore simple real-world examples for the greatest practical benefit, using some of the ever improving set of reverse engineering tools for Android. You don't need to have any experience reverse engineering anything before, but hopefully even if you do you'll learn a few useful tips. With this talk Jon aims to make every developer more familiar with the reverse engineering tools available for Android, and how and why they should apply them. There's an incredible amount that can be learned from taking things apart!
YOU MAY ALSO LIKE:
Reverse engineering is not just for hackers!
A freelance mobile developer with more than 6 years experience in Android (still got that G1!), and over 10 years previous in everything from JEE and Swing to C & C++. Has a love of clean code, tests and TDD, and taking things apart to see how they work.