
REX is here to help you learn! Use the articles below to help you use REX, or learn about building secure mobile applications.
USING REX
How to use the REX web application
Using the REX web application to scan your Android application for vulnerabilities
read moreSECURE MOBILE APPLICATION DEVELOPMENT
Part 1: Introduction & security grading
Why is mobile application security so important, and how can vulnerabilities be exploited?
read morePart 2: Transport Layer Security
How do you ensure the network layer is secure and is therefore not susceptible to eavesdropping?
read morePart 5: Binary Protections
What are binary protections and how can they increase you application security?
read morePart 7: Root/Jailbreak Detection
How can you prevent attackers taking advantage of weakened security controls?
read morePart 9: Hook Detection
How do you stop attackers modifying your applications behaviour at runtime?
read morePart 10: Runtime Integrity Checks
How can you detect whether your applications have been modified or are executing code that has been injected?
read morePart 11: Attacker Effort & stacking
How can combining security controls protect your application?
read more