Chapter |
Description |
1. Introduction |
A small introduction about the topic |
2. Native Concepts |
This chapter targets the native concepts, specifically in android applications and in systems in general |
3. Hooking |
This chapter explains memory manipulation (related to Chapter 2), hooking and own-code injection
into the target process
|
4. Protections in Theory |
This chapter discusses the methods to protect against the types of attacks mentioned in Chapter 3 |
5. Protections in Action |
This chapter shows some implementations to what was discussed in Chapter 4 |
6. Tiny Obfuscator |
This chapter shows how to make a tiny obfuscator |