iJiami SO library reinforcement and SDK reinforcement products provide all-round protection for the core codes of mobile applications and important SDKs to prevent malicious tampering, theft of user privacy information, etc.
Contact SalesSDK of Android Application
Offer shelling protection for JAR packets to prevent hackers from checking the codes in JAR packets with decompilation tools. Avoid leaking the structure of SO call interface and the core logic.
Provide shelling protection for SO files. After shelling, it is impossible to see the import and export functions or locate the source code of SO library files, effectively preventing hackers de-compilation. Real source code can be seen only after unpacking.
Confuse the source codes in SDK to reduce the readability of hacker de-compilation and increase the difficulty for decompilation. Multiple ways of confusion can be used together and the confusion intensity can be selected.
Using identification technology to bind call permissions by marking the eigenvalue of APK or JAR. SO files can only be called by designated SDK or APK. Prevent hackers from stealing SO files and use the SDK for other applications.
SDK of iOS Application
Protect oc / c / c ++ code with advanced confusion. The iOS confusion encryption tools can effectively increase the difficulty and complexity for hackers to collect information and prevent the leakage of core business logic in ida pro debugging. Multiple ways of confusion can be used together and the confusion intensity can be selected based on the needs of customers.
String protection and diversified instruction set.
Consists of splitting building blocks, inserting extra control flow, inserting jump instructions, and flattening control flow.
SO Reinforcement
Provide shelling protection for SO files. After shelling, it is impossible to see the import and export functions or locate the source code of SO library files, effectively preventing hacker de-compilation. Real source code can be seen only after unpacking.
Based on advanced technology and rich experience in mobile security field, iJiami analyzes attack means and behavior of hackers in the analysis stage. The SO confusion compiler can effectively increase the difficulty and complexity for hackers to collect information, prevent the application from being cracked, and reduce the security risk of application.
SDK of Android Application
Function Name | Main Functions |
---|---|
JAR Encryption | Shelling of JAR packets to prevent hackers from viewing the codes in JAR packets with decompiling tools. |
AAR Encryption | Shelling of JAR files in AAR packets to prevent hackers from viewing the codes in AAR packets with decompiling tools. |
SDK of iOS Application
Function Name | Main Functions |
---|---|
Xcode Confusion | Use Xcode confusion compiler to confuse SDK source code in order to effectively increase the difficulty and complexity for hackers to crack. |
SO Reinforcement
Shell SO files to prevent hackers from viewing the codes of SO files with decompiling tools.
Using SO confusion compiler to confuse the source code of SO file can effectively increase the difficulty and complexity for hackers to crack SO files.
Ensure that SO files can only be called by a specified APK.
Function Name | Main Advantages |
---|---|
SDK Reinforcement | Support Android SDK and iOS SDK reinforcement. |
Support JAR package and AAR package reinforcement. | |
SO Reinforcement | Unique LLVM confusion compiler to confuse SO source code, preventing the cracking of source code. |
Anti-call of SO files, preventing SO from being called by other APK files. |