A New Version of Quarks App Protect is now available
January 20, 2021

A new Quarks App Protect version is now available, supporting WebAssembly.

Quarkslab releases a new version of Quarks App Protect this week, a Quarks AppShield suite component. This new version introduces a new feature by supporting WebAssembly as a target platform. 

What is WebAssembly? 

Simply put, WebAssembly is a low-level language compiled as a binary which can be executed in a runtime. This runtime is commonly found into all modern web-browsers and allows to run code at near-native speeds. Its goal is not to replace Javascript but rather complement it for some use cases which requires a lot of performance. 

WebAssembly can be, in theory, targetted through many source languages, C/C++, Rust or AssemblyScript being commonly used.

While WebAssembly is designed to be secure as it is executed in a sandbox environment, this design does not protect against reverse engineering. Indeed, when WebAssembly binaries are run client-side, attackers can easily access and extract these, which can then be reverse-engineered. 

Obfuscation passes can be applied to WebAssembly binaries to slow down attackers and protect valuable intellectual property.

Organisations that intend to develop applications targeting WebAssembly should look into WebAssembly obfuscation to address this risk of application reverse-engineering.

One of the most compelling use cases of WebAssembly is that it enables organisations to port existing desktop applications to WebAssembly by reusing the existing codebase, as it supports C and C++ as source languages. By leveraging this capability, a software editor can effectively create new revenue streams thanks to the subscription possibilities that a web application entails. These organisations can then use Quarks App Protect to protect WebAssembly applications and consequently, these new revenue streams. 

What does Quarks AppShield accomplish?

By supporting WebAssembly as a compilation target with Quarks App Protect, web developers can now obfuscate their application, choosing from our catalogue of more than 25 possibilities.

Moreover, Quarks App Protect can easily be integrated into existing compilation processes as it integrates into standard WebAssembly toolchains (e.g. emscripten).

To learn more about Quarks App Protect and its capabilities, go to the following page:

https://quarkslab.com/quarks-appshield-app-protect/

If you wish to see Quarks App Protect in action, contact our team for a product demonstration by filling out the form at the following address: 

https://quarkslab.com/schedule-a-demo-quarks-appshield/