I’m an iOS engineer based in Prague, now focusing more deeply on mobile security research.
My background is in building iOS products and SDKs. More recently, I’ve been working on runtime protection, hook detection, memory integrity, and reverse-engineering-driven validation. This shift into security is recent in title, but not in interest. It feels like the natural extension of how I already think about systems: how they behave, where they break, and what happens under adversarial pressure.
- iOS runtime behavior
- Reverse engineering with Ghidra
- RASP, hook detection, and anti-tampering
- Mobile security research and proof-of-concepts
- Mobile Security Engineer at Thales
- Senior iOS Developer at SAP Concur
- 10+ years across iOS product engineering, SDK work, and mobile architecture
- ios-security-starter - iOS starter project with passive security checks and XCFramework audit CI
- secret-memory - Handy @Secret property wrapper for short-live sensitive data
- CombineStore - a lightweight state management library for SwiftUI apps using Combine
I’m using this profile more intentionally now to document the move from product-focused iOS engineering into security research. Over time, this space will include more notes, experiments, and small public artifacts around iOS internals, runtime protections, and related research problems.
- LinkedIn: linkedin.com/in/yangleetw


