-
Updated
Nov 13, 2020 - Python
mobile-security
Here are 89 public repositories matching this topic...
-
Updated
Nov 13, 2020
-
Updated
Oct 13, 2020 - JavaScript
-
Updated
Nov 4, 2020 - Python
-
Updated
Nov 4, 2020 - Python
-
Updated
Nov 5, 2020 - JavaScript
-
Updated
Jul 27, 2020
-
Updated
May 23, 2019 - JavaScript
-
Updated
Jul 1, 2020 - Java
-
Updated
Aug 30, 2020 - CSS
-
Updated
Nov 9, 2020 - JavaScript
-
Updated
Jun 25, 2020 - JavaScript
-
Updated
Aug 20, 2017 - Java
-
Updated
Feb 2, 2018
-
Updated
Sep 1, 2020
-
Updated
Nov 11, 2020 - TypeScript
-
Updated
Nov 14, 2020 - Vue
-
Updated
Dec 18, 2019 - CMake
-
Updated
Jun 1, 2020 - Python
-
Updated
Oct 28, 2020
-
Updated
Nov 3, 2020 - TypeScript
-
Updated
Sep 12, 2020 - Java
-
Updated
Feb 21, 2020 - Java
-
Updated
May 27, 2020 - Java
-
Updated
Nov 25, 2017 - Python
-
Updated
Oct 8, 2020
-
Updated
May 26, 2020 - Python
-
Updated
Nov 6, 2020
-
Updated
Nov 12, 2020 - PHP
Improve this page
Add a description, image, and links to the mobile-security topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the mobile-security topic, visit your repo's landing page and select "manage topics."
Add 8.7 and 8.8 for android and ios: show how you can delay the attacker or report tampering to the backend as a response to a tamper detected
8.7: The app implements multiple mechanisms in each defense category (8.1 to 8.6). Note that resiliency scales with the amount, diversity of the originality of the mechanisms used.
8.8: The detection mechanisms trigger responses of different types, includ