“Defend the Web” write-up (Intro 6— client code modification vulnerability)
Modified versions of programs are far more prevalent than you might imagine. There is a whole security sector dedicated to detecting and deleting illegitimate mobile app versions from app marketplaces. Organizations can have limited to extremely successful means of discovering unauthorized copies of code in the wild, depending on the approach adopted to solve the problem of detecting code change. Binary patching, local resource modification, method hooking, method swizzling, and dynamic memory alteration are all included in this…