Duration: 1+ months
In our Munich-based app analysis Java team we work on tools to automatically analyze Android apps. Our software is based on our open source bytecode manipulation library ProGuardCORE ( https://github.com/Guardsquare/proguard-core ) for static analysis, and on own tooling for dynamic analysis.
Android app developers can use different obfuscation tools to hide the app’s internals from reverse engineers. In this internship, you will investigate different approaches to determine if an app is obfuscated, and write a proof-of-concept which takes an app as input and shows the parts that are obfuscated.
- Experience with Java
- Interest in code analysis
- Ability to independently perform structured research into a topic
Guardsquare offers the most complete approach to mobile application security on the market. Built on the open source ProGuard technology, Guardsquare’s software integrates seamlessly across the development cycle. From app security testing to code hardening to real-time visibility into the threat landscape, Guardsquare solutions provide enhanced mobile application security from early in the development process through publication.
More than 900 customers worldwide across all major industries rely on Guardsquare to help them identify security risks and protect their mobile applications against reverse engineering and tampering.
Guardsquare is based in Leuven (Belgium) with offices in Boston (USA) and Munich (Germany).
At Guardsquare, we take pride in being a diverse and multicultural company with team members representing numerous nationalities. We value different perspectives and opinions throughout the business which has contributed to our being the market leader in mobile application security.
You will be part of a dynamic team that strives for excellence and focuses on continuous education and enhancement in skills. We encourage & empower our trusted colleagues to share their opinions, actively collaborate, and continue to learn and grow.