Chip & System Security Testing 
Mobile & Backend Security Testing 
Our Company 
Contact us
Android Basics

Android basics from the reverse engineer point of view

This module is dedicated to anyone willing to understand the basics of Android applications reverse engineering. Through our practicals, you will unfold an Android mobile application and explore its different components. And for each component, a first exploration will be made to understand how they work, and how they are executed during the process and better understand the potential entry points. Basics of the runtime execution environment are covered.

Covered Topics

What you will learn:

  • The anatomy of an application
  • The lifecycle of an application
  • Entry points to focus on
  • How applications are launched
  • The underlying runtime environment to better foresee what's outside of the box instead of only focusing on the application
  • The SMALI syntax
  • Introduction to tools


This module is an introduction to the different notions for reverse engineering. There is no practical for this session.


  • Knowledge of the Java programming language
  • Being at ease with Linux-based environment system
Contact us

Practical information

Overall duration: 1 day

Schedule: 9:30am - 11am (CET/CEST) - virtual/in person

Number of trainees: 10 trainees max.

Our Coaches

CopyRights eShard 2023.
All rights reserved
Privacy policy | Legal Notice
Side Channel AnalysisLaser & EM Fault InjectionFirmware Security AnalysisSecurity Failure AnalysisVulnerability ResearchMAST: Mobile Application Security Testing