| Chapter | Description |
|---|---|
| 1. Introduction | A small introduction about the topic |
| 2. Native Concepts | This chapter targets the native concepts, specifically in android applications and in systems in general |
| 3. Hooking | This chapter explains memory manipulation (related to Chapter 2), hooking and own-code injection into the target process |
| 4. Protections in Theory | This chapter discusses the methods to protect against the types of attacks mentioned in Chapter 3 |
| 5. Protections in Action | This chapter shows some implementations to what was discussed in Chapter 4 |
| 6. Tiny Obfuscator | This chapter shows how to make a tiny obfuscator |