iJiami offers comprehensive Android/iOS/H5 application security reinforcement service to help users address diversified security risks, such as cracking, tampering, hijacking, piracy, data theft, phishing fraud, etc., that exist in mobile applications ubiquitously.
Contact SalesAndroid Application Security Reinforcement
DEX and SO files are protected by DEX add-on and shelling, advanced obfuscation of SO files, and shelling, preventing them from being analyzed by reverse tools such as IDA.
Extract the file eigenvalues of each file in the application when reinforcing, and when the file is running, the system decrypts the encrypted file to extract the eigenvalue for file verification.
Multiple encryption technology to prevent code injection, JAVA layer / C layer dynamic debugging, code injection and HOOK attacks.
Use a variety of encryption algorithms, including international common algorithms and independently developed encryption algorithms to protect local data.
Anti-hijacking of application, anti-screen capture of application, virtual keyboard SDK products and technologies, preventing interface hijacking plug-ins to monitor components in all directions.
Data encryption SDKs are embedded at the client and server respectively to ensure that the data transmitted in the channel are highly encrypted.
iOS Application Security Reinforcement
Perform random encryption of string, dynamically decrypt at runtime, and rename them.
Provide encryption for data transmission to effectively prevent data interception via network interface.
Randomly convert each logical instruction into equivalent combinations of multiple logical instructions to increase the difficulty for hacker analysis and effectively protect the algorithm.
logical structures of the application are mixed to minimize the readability of source code.
H5 Application Security Reinforcement
Perform meaningless confusion of the variable names in js code files.
Perform confusion of the codes in js code files, including shift of control flow, confusion of variable name and function name, etc.
Detect the operating environment of JavaScript code and respond quickly and effectively by studying the working principle and the characteristics of the debugger.
Unicode characterization of the strings in js files to hide them, in order to reduce the readability of the code and increase the difficulty for reverse analysis personnel to interpret the code.
Extract string from the js file and place in an array, at the beginning of the file, and the afterwards reference is indirect reference, so as to reduce code readability.
Android Application Security Reinforcement
Source code protection, SO library protection, DEX file protection, data encryption protection.
Anti-piracy protection, anti-tampering, page anti-hijack technology, anti-screen capture technology, environment clearance, message anti-hijack.
Key white box technology, application communication link encryption, data local encryption technology, and secure keyboard.
Increment of package size after encryption shall not exceed “±5%” of the original package, comprehensive compatibility and performance test.
iOS Application Security Reinforcement
Randomly encrypt and rename a string, randomly convert each logical instruction into an equivalent combination of multiple logical instructions to increase the difficulty for hacker analysis and effectively protect the algorithm.
The building block is randomly split into multiple building blocks to further complicate the control flow. Insert extra control flow and add extra jump instructions, increasing the difficulty of reverse tool analysis.
H5 Application Security Reinforcement
Android Application Security Reinforcement
iOS Application Security Reinforcement
H5 Application Security Reinforcement