The best way to find runtime threats is a penetration test from a team of experts. Pen-test teams pretend they’re hackers and attack your application. They attack your external interfaces and look for SQL injection, cross-site scripting, denial of service (DDOS) attacks, privilege escalation ...
* DoS/DDoS - attack causing denial of service. Can be done from single device (DoS) or from device network (botnet) - DDoS. It is not possible to DoS a website with packet flooding from single Android device because you will need lots of bandwidth (1.5 - 500 Gbps). DoS through explo...