Olivia is employed as a system administrator in an organization. She aims to extract the source code of a mobile application and disassemble the application to scrutinize its design flaws. Through this method, Olivia intends to address any bugs in the application, identify potential vulnerabilities, and enhance defense strategies against attacks. What is the technique employed by Olivia in the above scenario to bolster the security of the mobile application?