Blog

DeviceLine Radio: Felix Matenaar On Reverse Engineering Android Apps

September 13, 2013

This week I’m talking with Felix Matenaar, senior engineer at Bluebox labs about reverse engineering Android APK files. Felix, along with Patrick Schulz from Bluebox, will be among the world-class speakers at the upcoming Amphion Forum in San Francisco on December 12 and 13, an event hosted by Mocana and presented by SAP, Forrester Research and Codenomicon. DeviceLine readers can register for a special early discount here by using the complimentary discount code DeviceLine100.

If you have ever written your own Android app or had a chance reverse engineer it, you’ll find the mystery behind the APK file is nothing more than a zipped file of java-like classes and files with some native code. The process might be that you download an app on a PC running Linux and use tools like APKtool to decompile to investigate what the apps or could do. That’s what Felix has done and we talked a little about his methods and some of the vulnerabilities he found. We talked about Dexter a tool that his company released last February to make reverse engineering Android app easy. And we also talked about his talk “Android Reverse Engineering & Defenses” at SOURCE: Dublin where he co-presented with Schulz earlier this year.

Read More

Samsung's Galaxy Gear SmartWatch Debuts

September 12, 2013

In Berlin and New York this week Samsung unveiled its new products, but on in particular got a lot of attention: the Samsung smartwatch, Galaxy Gear.

Read More

GSA Finds Mobile Security Lacking

September 12, 2013

Apps launched by the General Services Administration (GSA) have security flaws, says a watchdog group.

Read More

DeviceLine Radio: Scott Michaels On Creating Secure Enterprise Apps

September 6, 2013

This is a re-broadcast of a show that originally aired May 3, 2013.

Read More

App Authentication Flaw Creates Tesla Motors Hack Concern

August 28, 2013

The Tesla Model S is such an advanced automobile it even comes with its own mobile authentication vulnerability.

Read More
COMMENTS