REX logo

LEARN

HOW TO USE REX AND WRITE SECURE CODE

REX is here to help you learn! Use the articles below to help you use REX, or learn about building secure mobile applications.

USING REX

How to use the REX web application

Using the REX web application to scan your Android application for vulnerabilities

read more

SECURE MOBILE APPLICATION DEVELOPMENT

Part 1: Introduction & security grading

Why is mobile application security so important, and how can vulnerabilities be exploited?

read more
Part 2: Transport Layer Security

How do you ensure the network layer is secure and is therefore not susceptible to eavesdropping?

read more
Part 3: Certificate Pinning

How do you increase security around certificates?

read more
Part 4: Data Storage

What data should and shouldn't be stored on the device?

read more
Part 5: Binary Protections

What are binary protections and how can they increase you application security?

read more
Part 6: Obfuscation

How can you implement obfuscation?

read more
Part 7: Root/Jailbreak Detection

How can you prevent attackers taking advantage of weakened security controls?

read more
Part 8: Debug Protection

How do you prevent attackers using a debugger on your application?

read more
Part 9: Hook Detection

How do you stop attackers modifying your applications behaviour at runtime?

read more
Part 10: Runtime Integrity Checks

How can you detect whether your applications have been modified or are executing code that has been injected?

read more
Part 11: Attacker Effort & stacking

How can combining security controls protect your application?

read more