This commit is contained in:
parent
d34e403ca5
commit
3b5df50248
16 changed files with 1629 additions and 248 deletions
|
|
@ -3,9 +3,10 @@
|
|||
== Introduction
|
||||
|
||||
In order to understand the challenges of reverse engineering Android applications, we first need to understand some key concepts and specificities of Android.
|
||||
In particular, the format in which applications are distributed, as well as the runtime environment that runs those applications, is very specific to Android.
|
||||
In particular, the format in which applications are distributed, as well as the runtime environment that runs those applications, are very specific to Android.
|
||||
To handle those specificities, a reverse engineer must have appropriate tools.
|
||||
Some of those tools are used recurrently, either by the reverse engineer themself, or as a basis for other more complex tools that implement more advanced analysis techniques.
|
||||
// NOTE: "reverse engineer themself": both themself and themselves are correct, I prefere themself here because it's one specific non gendered engineer.
|
||||
|
||||
Among those techniques, the ones that do not require running the application are called static analysis.
|
||||
Over time, many of those tools have been released.
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue