Panel: Engineers vs. Reverse Engineers

The Talsecarrow-up-right Mobile App Security Conference in Prague was a two-day, invite-only event on fraud, malware, and API abuse in modern mobile apps, held at Chateau St. Havel on November 3–4, 2025, and hosted by Talsec, freeRASP, and partners. It brought together leading experts and practitioners to strengthen the mobile AppSec community, connect engineers with attackers and defenders, and share practical techniques for high‑stakes sectors like banking, fintech, and e‑government.

The battle between those who build software and those who deconstruct it is not a traditional conflict but an ongoing, innovative cycle that drives the entire technology industry forward. This dynamic is less about finding a definitive winner and more about the collective advancement of digital security. This article summarizes a panel discussion exploring these themes.

The Defensive Dilemma: Are We Fighting a Losing Battle?

At first glance, it may seem that reverse engineers always hold the upper hand. Once an application is released, skilled individuals with the right tools can eventually uncover its secrets. However, this "rhetorical" win is part of a necessary balance.

  • Raising the Cost of Attack: The primary goal for engineers is not necessarily to create an "unhackable" system, but to make the process of attacking so difficult and expensive that it is no longer profitable for non-ethical hackers.

  • Offense Drives Defense: Without offensive pressure, defensive measures would stagnate. Innovative attacks force engineers to create more resistant hardware and software, leading to a safer global digital environment.

Historical Architecture and Modern Solutions

Much of the current security struggle stems from foundational computing architectures designed decades ago with performance, rather than security, as the priority. Historically, compilers were built to optimize for speed and memory, not to resist reverse engineering. Modern shifts are beginning to address these roots:

  • Security-First Compilers: New development focuses on compilers that produce output that is inherently difficult to reverse.

  • Hardware Evolution: Innovations like built-in chips for data encryption and secure enclaves are now standard even in low-end devices, significantly raising the barrier for entry-level hacking.

Future Frontiers: AI, Quantum, and Thin Clients

The technological landscape is moving toward several parallel paths that could redefine security:

  • AI and Deep Fakes: While AI has increased the volume and sophistication of attacks—such as 2,000% increases in deep fake incidents—it also provides engineers with new tools to detect and mitigate these threats.

  • Quantum Computing: Though commercial quantum computing is still emerging, the development of quantum-resistant cryptography is already underway to stay ahead of future vulnerabilities.

  • The Return of Thin Clients: A potential shift back to centralized execution (where code runs on a secure mainframe rather than the local device) could make traditional local reverse engineering obsolete, though it would shift the focus toward cloud and transport security.

Open Source: A Double-Edged Sword

There is a general consensus that open-source projects contribute to global security by allowing for public auditing and learning. However, this openness comes with significant risk; a vulnerability in a single widely used open-source package can impact billions of systems simultaneously.

Practical Advice for Technical Leaders

The most critical takeaway for CTOs and technical decision-makers is to move away from an "opposition mindset" between engineering and security.

  • Invest in Culture: Security should not be a final step or something done only because a security officer demands it. It must be a standard part of the engineering culture.

  • Shift Left: Cyber security professionals should be involved from the beginning of a project, rather than being called in only at the end.

  • Assume Vulnerability: Every employee should work with the baseline assumption that security is a continuous, background process in every line of code they write.

circle-check

Last updated

Was this helpful?