This week I’m talking with Felix Matenaar, senior engineer at Bluebox labs about reverse engineering Android APK files. Felix, along with Patrick Schulz from Bluebox, will be among the world-class speakers at the upcoming Amphion Forum in San Francisco on December 12 and 13, an event hosted by Mocana and presented by SAP, Forrester Research and Codenomicon. DeviceLine readers can register for a special early discount here by using the complimentary discount code DeviceLine100.
If you have ever written your own Android app or had a chance reverse engineer it, you’ll find the mystery behind the APK file is nothing more than a zipped file of java-like classes and files with some native code. The process might be that you download an app on a PC running Linux and use tools like APKtool to decompile to investigate what the apps or could do. That’s what Felix has done and we talked a little about his methods and some of the vulnerabilities he found. We talked about Dexter a tool that his company released last February to make reverse engineering Android app easy. And we also talked about his talk “Android Reverse Engineering & Defenses” at SOURCE: Dublin where he co-presented with Schulz earlier this year.Read More