Core Technology

SDK of Android Application

  • JAR Shelling

    Offer shelling protection for JAR packets to prevent hackers from checking the codes in JAR packets with decompilation tools. Avoid leaking the structure of SO call interface and the core logic.

  • SO File Shelling

    Provide shelling protection for SO files. After shelling, it is impossible to see the import and export functions or locate the source code of SO library files, effectively preventing hackers de-compilation. Real source code can be seen only after unpacking.

  • Confusion of Source Codes

    Confuse the source codes in SDK to reduce the readability of hacker de-compilation and increase the difficulty for decompilation. Multiple ways of confusion can be used together and the confusion intensity can be selected.

  • Prevent Illegal Calls

    Using identification technology to bind call permissions by marking the eigenvalue of APK or JAR. SO files can only be called by designated SDK or APK. Prevent hackers from stealing SO files and use the SDK for other applications.

SDK of iOS Application

oc / c / c ++ Code Protection

Protect oc / c / c ++ code with advanced confusion. The iOS confusion encryption tools can effectively increase the difficulty and complexity for hackers to collect information and prevent the leakage of core business logic in ida pro debugging. Multiple ways of confusion can be used together and the confusion intensity can be selected based on the needs of customers.

Data Flow Protection Includes

String protection and diversified instruction set.

Control Flow Protection

Consists of splitting building blocks, inserting extra control flow, inserting jump instructions, and flattening control flow.

SO Reinforcement

  • SO File Shelling

    Provide shelling protection for SO files. After shelling, it is impossible to see the import and export functions or locate the source code of SO library files, effectively preventing hacker de-compilation. Real source code can be seen only after unpacking.

  • Confusion Protection for SO Files

    Based on advanced technology and rich experience in mobile security field, iJiami analyzes attack means and behavior of hackers in the analysis stage. The SO confusion compiler can effectively increase the difficulty and complexity for hackers to collect information, prevent the application from being cracked, and reduce the security risk of application.

Main Functions

SDK of Android Application

Function Name Main Functions
JAR Encryption Shelling of JAR packets to prevent hackers from viewing the codes in JAR packets with decompiling tools.
AAR Encryption Shelling of JAR files in AAR packets to prevent hackers from viewing the codes in AAR packets with decompiling tools.

SDK of iOS Application

Function Name Main Functions
Xcode Confusion Use Xcode confusion compiler to confuse SDK source code in order to effectively increase the difficulty and complexity for hackers to crack.

SO Reinforcement

  • SO File Shelling

    Shell SO files to prevent hackers from viewing the codes of SO files with decompiling tools.

  • SO Code Confusion

    Using SO confusion compiler to confuse the source code of SO file can effectively increase the difficulty and complexity for hackers to crack SO files.

  • Anti-Call of SO Files

    Ensure that SO files can only be called by a specified APK.

Main Advantages

Function Name Main Advantages
SDK Reinforcement Support Android SDK and iOS SDK reinforcement.
Support JAR package and AAR package reinforcement.
SO Reinforcement Unique LLVM confusion compiler to confuse SO source code, preventing the cracking of source code.
Anti-call of SO files, preventing SO from being called by other APK files.

Contact Sales

First Name

Last Name

Telephone

Email

Company

Country/Region

Industry

Suggestion

Verification Code