Dáša Pawlasová, Matúš Šikyňa, and Tomáš Soukal
January 5, 2024

Fraud-Proofing an Android App: Choosing the Best Device ID for Promo Abuse Prevention

This issue holds particular significance for mobile application owners who frequently contend with users evading payments or exploiting various bonuses.
This issue holds particular significance for mobile application owners who frequently contend with users evading payments or exploiting various bonuses.
You can read more about the concept of RASP (Runtime application self-protection)
here.

You may also like

Simple Root Detection: Implementation and verification
Simple Root Detection: Implementation and verification
Basics of root detection, how to implement and test.
Why Mobile Games are Prime Targets for Cyberattacks
Why Mobile Games are Prime Targets for Cyberattacks
And What Developers Must Do to Stay Ahead
OWASP Top 10 For Flutter – M4: Insufficient Input/Output Validation in Flutter
OWASP Top 10 For Flutter – M4: Insufficient Input/Output Validation in Flutter
New entry in our deep dive into the OWASP Mobile Top 10.
Read More