
Software Engineering Daily Mobile App Security with Ryan Lloyd
34 snips
Apr 9, 2026 Ryan Lloyd, Chief Product Officer at GuardSquare and former developer-tools specialist, discusses mobile app security. He highlights why mobile differs from web, the evolution of reverse-engineering tools, layered obfuscation and runtime protections, API attestation, threat monitoring, and how LLMs are changing attacker capabilities.
AI Snips
Chapters
Transcript
Episode notes
Developer Tools Background Shapes Mobile Security
- Mobile app security shares tooling history with developer tools and testing but requires specialized focus on runtime tampering.
- Ryan's path from test automation to Veracode informed Guardsquare's developer-oriented security product approach.
Value Concentration Drives Reverse Engineering Ecosystem
- Attackers concentrate where value is; mobile apps attracted a mature reverse-engineering ecosystem.
- LLMs now accelerate knowledge sharing so more attackers can learn tooling and techniques faster than before.
Obfuscation Needs Multiple Complementary Layers
- Static reverse engineering is defended primarily by layered code obfuscation to make decompiled output unreadable.
- Techniques include name obfuscation, string/class encryption, control-flow obfuscation, and virtualization to raise analysis effort.


