drozer, etc.) • Eternal secrets of ADB and Manifest, Logs, etc. • Exploits: sniffing network traffic, attacking services, providers • SQL-injections • Man-in-the-middle attacks • Custom permissions protection • ProGuard and DexGuard • Reverse Engineering, DEX, GDB • Cross-compiling native executables • Securing SharedPreferences • SQLCipher • etc...