![]() [Mobile game]Prevent malicious plug-ins from tampering with the time of the mobile phone system to make the accelerators and ensure the fairness of mobile gameĬ, C++ code in SO file for confusing encryption protectionĬonvert Java code into C code through Java 2c technology, and implement code obfuscation protection for Native layer Prevent an attacker from attaching a debugger to the running APP and maliciously analyzing the execution process of the code Prevents an attacker from tampering with or dumping sensitive data in memory If the verification fails, it will exit to avoid the generation of pirated applications When the application runs, the signature file is dynamically verified. [Unity mobile game]Extract and encrypt functions of DLL files and perform dynamic decryption at runtime to prevent complete C# code from being dumped in memory [Unity mobile game]DLL file overall shell protection, Reflector and other tools to decompile extraction C# code SO file for shell protection,Prevent reverse analysis [The free version encrypts only 20% of the functions randomly, while the enterprise version encrypts all dynamic functions] The dynamic function of DEX file is extracted and encrypted, and the dynamic decryption is executed at runtime to protect Java code Virtualization encryption protection for core codeĬustom CPU instructions can be analyzed and the original CPU instructions can be automatically restoredĬustomize upgrade virtualization solutions Protect SO files with code obfuscation encryptionĮliminate the obfuscation code in SO file and restore the original code automatically Repair ELF files, decompile the restored SO files using IDA tools, and analyze the core code logic Integrated memory protection, anti-debugging function, and use Java2c technology to convert Java code into C code, and SO shell protection Use apktool, dex2jar, jd-gui, baksmali and other tools to directly obtain Java codeĬrypt the DEX file, or encapsulate the core code in the SO fileĭe圎xtractor and other automatic extractor tools are used to extract Java code dynamically from memory data ĭecompilation DEX files, decompilation SO files, stealing core technologies, stealing sensitive data, implanting malicious viruses, tampering with copyright information, cracking authorization code, cracking communication protocols, secondary packaging and many other security risks. Self Protection: Protecting the program's own code with virtualizationĪndroid app encryption is an encryption service for mobile android applications that helps Internet companies and individual developers protect core technologies and intellectual property rights.Users only need to provide the packaged APK file, which can integrate DEX file encryption, SO file shell, anti-secondary packaging and other security functions.For different application security requirements, different levels of security protection functions can be provided, such as high-intensity security confrontation, you can choose to use Java2C, code confusion or KiwiVM.Anti-secondary Packaging: Signature verification to prevent piracy applications.Anti-debugging: Prevent applications from being debugged by GDB and IDA tools.Memory Protection: Protect memory data from memory dump, tampering and other attacks.So Packer: The Ultimate Packer for So file, to prevent reverse analysis by IDA tool. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |