Chip Security TestingΒ 
Binary Security AnalysisΒ 
Contact us
Android Basics

Android basics from the reverse engineer point of view

This module is dedicated to anyone willing to understand the basics of Android applications reverse engineering. Through our practicals, you will unfold an Android mobile application and explore its different components. And for each component, a first exploration will be made to understand how they work, and how they are executed during the process and better understand the potential entry points. Basics of the runtime execution environment are covered.

Covered Topics

What you will learn:

  • The anatomy of an application
  • The lifecycle of an application
  • Entry points to focus on
  • How applications are launched
  • The underlying runtime environment to better foresee what's outside of the box instead of only focusing on the application
  • The SMALI syntax
  • Introduction to tools


This module is an introduction to the different notions for reverse engineering. There is no practical for this session.


  • Knowledge of the Java programming language
  • Being at ease with Linux-based environment system
Contact us

Practical information

Overall duration: 1 day

Schedule: 9:30am - 11am (CET/CEST) - virtual/in person

Number of trainees: 10 trainees max.

Our Coaches

CopyRights eShard 2024.
All rights reserved
Privacy policy | Legal Notice