Reverse Engineering Mobile Applications
Everybody is writing apps and many of us are not writing them well. Mobile applications can contain a number of security vulnerabilities, both common across many application styles as well as some that are unique to the mobile ecosystem. In this session we will learn the various techniques bad guys can use to extract information from your Android mobile applications, how that information can be used to compromise your systems or your users and how you can harden your applications to be more resistant.