Quarks App Protect

Application Source Code & Data Protection

Source code and data are today’s crucial assets of an application. A layered security approach is the right way for preserving their integrity and confidentiality against attackers.

Software running on untrusted environments is at risk of reverse-engineering: an application running on a device which is available to an attacker is vulnerable to a wide range of techniques used to try and extract secrets, intellectual property.

To prevent unauthorised parties from gaining insight, tamper with or even recover the source code from the binary, software protection mechanisms must be implemented to preserve revenues and intellectual property.

Comprehensive software protection for firmware and applications

Code & Data obfuscation

Protection against static analysis

  • 30+ obfuscation schemes available
  • Granular control of the protection profile thanks to a file-based policy or comments throughout the code
  • Build diversification: each compiled application is different with a user-controlled randomness seed

+

Device Trust Assessment

Protection against dynamic analysis

  • Dynamic checks: detection of rooted or jailbroken devices
  • Integrity checks and detection of debuggers, emulators and hooking frameworks
  • Triggering of specific actions on the detection of anomalies

Best-in-class Software Protection

Choose among a large catalog of more than 30 obfuscation passes to protect your application, as well as device trust assesment features. By layering these protection mechanisms throughout software, your intellectual property will stay hidden from prying eyes.

Outstanding performance/security ratio

Protection mechanisms can be applied either all at once or on selected software parts, allowing application developers to fine-tune their security profile depending on their software specific logic, in order to achieve the ideal approach towards allying performance and security.

Extensive professional services

Thanks to Quarks AppShield flexibility and agility, security officers can design the most appropriate security configuration and count on our team of Subject Matter Experts to support them in achieving their objectives if needed.

Key features

Quarks App Protect
Protection mode Static and dynamic
Protection layers

Code & Data obfuscation with more than 30 different passes available

Dynamic protections: anti-root, anti-jailbreak, anti-debug, anti-hooking, anti-dynamic analysis

Integrity checks / anti-tampering

Multi-level configuration: block, function, module

Automatic test & reporting on the applied protections

Languages C/C++
Security policy External YAML configuration or Pragma in the source code
Targeted Platforms Android, iOS, Linux, Windows, OS X, WebAssembly
Supported Architectures ARM, ARM64, x86, x86_64
IDE integrations Apple XCode, Microsoft Visual Studio, & Google Android NDK
Sec/Dev/Ops (CI Integrations) Gitlab, Jenkins

Reach out to our team for a product demonstration

Related Resources

Securing Mobile Payment Applications

Securing Mobile Payment Applications

Payment systems are at the heart of the global economy. Over the past few decades, electronic payments have grown at a fast pace, supplanting traditional payment systems such as cheques and cash to become the current standard.  These systems have evolved over the...

read more
Cases studies – Viaccess Orca

Cases studies – Viaccess Orca

The streaming video market is estimated to reach 110 billion euros by 2024, with an average annual growth of almost 20%. Boosted by mobile devices, ever more powerful 4G and soon 5G connections, online video consumption is here to stay. Viaccess-Orca (VO) is one of...

read more
Infographic – Mobile Payment

Infographic – Mobile Payment

Discover in the infographics below how mobile payment works and what are the risks and threats  with the development of payments from mobile platforms. See the infographics: https://bit.ly/3oIhyAO

read more