OS
      Products
      Topic Areas
      Industries
      Reset
      How to Protect Against Android Overlay Attacks https://www.guardsquare.com/blog/protecting-against-android-overlay-attacks-guardsquare

      How to Protect the Android Accessibility Service https://www.guardsquare.com/blog/protecting-against-android-accessibility-services-threats

      Phases of a Mobile App Attack, Part 2: The Attacker’s POV https://www.guardsquare.com/blog/mobile-app-attack-phases-part-2

      Call Graphs: The Bread and Butter of Program Analysis https://www.guardsquare.com/blog/call-graphs-the-bread-and-butter-of-program-analysis

      How Development Skills Translate to Reverse Engineering: Using LLDB to Reverse Engineer an Android App https://www.guardsquare.com/blog/how-development-skills-translate-to-reverse-engineering

      How Classical Attacks Apply to Frida Flutter™ https://www.guardsquare.com/blog/how-classical-attacks-apply-to-flutter-apps

      Strings, Please! Eliminating Data Leaks Caused by Kotlin Assertions https://www.guardsquare.com/blog/eliminating-data-leaks-caused-by-kotlin-assertions

      Dart Decompilation and the Impact on Flutter™ App Security https://www.guardsquare.com/blog/obstacles-in-dart-decompilation-and-the-impact-on-flutter-app-security

      The Current State & Future of Reverse Engineering Flutter™ Apps https://www.guardsquare.com/blog/current-state-and-future-of-reversing-flutter-apps

      Beyond Taint Analysis: Detecting Data Flows in Java Applications with ProGuardCORE https://www.guardsquare.com/blog/detecting-data-flows-in-java-applications-with-proguardcore