Decompiling Android with Godfrey Nolan
WHEN: April 24, 2012 6:30PM to 8:30PM
WHERE: ePrize Headquarters
COST: FREE
REGISTER HERE: http://djug-april.eventbrite.com
Due to the design of the Java Virtual Machine (or JVM), it is relatively trivial to reverse-engineer Java code from Java jar and class files. While this hasn't been an issue in the past since most Java files are hidden on the server, it is an issue on Android phones where the client-side Android APK files are easily obtained and just as easy to decompile back into source.
Come to this session to learn the how and why this is possible by unraveling the APK into DEX files and the tools that are currently available to decompile your APKs back into Java or HTML5 source code with the right click of a mouse. The session will also show some of the security issues that this raises, such as inadvertently allowing people to gain access to credit card information or back-end systems when someone has complete access to your source.
We'll also look at open-source and commercial obfuscation tools and other techniques you should be using, such as C++ coding and more to stop people gaining access to your Android code. While you don't need any knowledge of decompilation or obfuscation techniques before the session, you will be armed by the end with enough information to safeguard your intellectual property from what is a very significant and little understood issue.
GODFREY NOLAN
Godfrey is founder and president of RIIS, a mobile development firm in the Detroit Metro area. He is also author of "Decompiling Java" (Apress) and the soon-to-be-published "Decompiling Android." Godfrey has spoken at JavaOne, ASP-Connections, VSLive, Codemash, Code PaLOUsa, 1DevDay, and many local Java and .NET user groups on a wide range of topics, such as continuous integration, executable requirements and mobile security.
Twitter : @riisllc