Chapter 5. Protecting Applications
In this chapter, we will cover the following recipes:
- Securing application components
- Protecting components with custom permissions
- Protecting content provider paths
- Defending against the SQL-injection attacks
- Application signature verification (anti-tamper)
- Tamper protection by detecting the installer, emulator, and debug flag
- Removing all log messages with ProGuard
- Advanced code obfuscation with DexGuard