O'Reilly logo

Android Security by Abhishek Dubey, Anmol Misra

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7

Modifying the Behavior of Android Applications without Source Code

This chapter builds on Chapter 6. We begin by discussing potential use cases for recompiling/modifying the behavior of applications. We show how to analyze and debug Android application binaries. We cover the .dex file format and show how to decompile and recompile Android applications without having access to source code, thus changing the application’s behavior. We demonstrate how an attacker can change an application’s behavior by decompiling the application, changing the smali code, and recompiling it.

7.1 Introduction

The techniques covered in this chapter are not generally used by a typical user or developer. A person using the techniques covered here is probably ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required