Prevent Android APK from decompiling and anti-reverse engineering with encryption/virtualization the dex file, .so libs.
Verify the developer signature in APK file, to prevent APK file from repackaging, malware code inject.
Prevent from dynamic/static debugging, parsing the code logic & algorithm.
Encrypt the dex file to prevent the code breaching and decompiling
Compression/Encryption to code section of .so libs to prevent hacker using the IDA or JEB tool to decompile code.
Insert break point detection when obfuscation. to prevent run tracing and debug to native layer.
Effective to against hacker using IDA, JEB tool to debug, parse the code logic.
Verifying the developer signature when apk start execution to prevent apk be cracking & repackaging
Memory integrity checking when loading .so libs to prevent patching to .so libs by third party.
Obfuscate the specific functions of .so libs, combined with obfuscation of control flow, renaming and obfuscate class name. encryption, convert the native instruction into teh instructions hard to read & understand. which effective to against decompiling by IDA tools or other tools.
Virtualized the specify functions in the .so libs. transform the instruction in X86/X64, ARM64 to the instructions in the VM which random generated. which achieved utmost security in source code level and can be configured to balance the security and efficiency.
virtualization the dalvik bytecode and transform into self defined the instructions in VM, and executed in the VM in native layer to prevent the reverse engineering.
The utmost & leading security approach of Virtualization & Obfuscation technology in native layer & independent on LLVM. achieved & enhanced security to protected code.
Without additional code insert/embedding which doesn't related to protection. No personal/private info collected.
No change to existed development environment, easy to use & integration & effortless to design your protection scheme.
On Premise protection on developer site, No code will be uploaded to the cloud and no code leaky risk in protection process.
Developer may free specify the functions be protected and has capability in Balancing security & execution efficiency. almost No impact on performance to protected software.
Tampering by hacker for software piracy or code inject for malware code & Repackaging
Malicious Attacking & Stealing your Intellectual property
Reverse engineering & Decompiling your apks, The source code be transformed to readable & understandable code, lost of your core competence in your market segment
Losing revenue due to bypassing the payment process & and manipulate game data by using cheating/fraud tools or emulator in gaming apps and losing real player