A system administrator in an organization aims to enhance the security of a mobile application by extracting its source code and disassembling it for design flaw analysis. Through this method, the goal is to identify and address bugs, uncover potential vulnerabilities, and enhance defense strategies against various attacks. What is the technique employed in this scenario to bolster the security of the mobile application?