Quarks App Protect
Application Source Code & Data Protection
Source code and data are today’s crucial assets of an application. A layered security approach is the right way for preserving their integrity and confidentiality against attackers.
Software running on untrusted environments is at risk of reverse-engineering: an application running on a device which is available to an attacker is vulnerable to a wide range of techniques used to try and extract secrets, intellectual property.
To prevent unauthorised parties from gaining insight, tamper with or even recover the source code from the binary, software protection mechanisms must be implemented to preserve revenues and intellectual property.
Comprehensive software protection for firmware and applications
Code & Data obfuscation
Protection against static analysis
- 30+ obfuscation schemes available
- Granular control of the protection profile thanks to a file-based policy or comments throughout the code
- Build diversification: each compiled application is different with a user-controlled randomness seed
Device Trust Assessment
Protection against dynamic analysis
- Dynamic checks: detection of rooted or jailbroken devices
- Integrity checks and detection of debuggers, emulators and hooking frameworks
- Triggering of specific actions on the detection of anomalies
Best-in-class Software Protection
Choose among a large catalog of more than 30 obfuscation passes to protect your application, as well as device trust assesment features. By layering these protection mechanisms throughout software, your intellectual property will stay hidden from prying eyes.
Outstanding performance/security ratio
Protection mechanisms can be applied either all at once or on selected software parts, allowing application developers to fine-tune their security profile depending on their software specific logic, in order to achieve the ideal approach towards allying performance and security.
Extensive professional services
Thanks to Quarks AppShield flexibility and agility, security officers can design the most appropriate security configuration and count on our team of Subject Matter Experts to support them in achieving their objectives if needed.
|Quarks App Protect|
|Protection mode||Static and dynamic|
Code & Data obfuscation with more than 30 different passes available
Dynamic protections: anti-root, anti-jailbreak, anti-debug, anti-hooking, anti-dynamic analysis
Integrity checks / anti-tampering
Multi-level configuration: block, function, module
Automatic test & reporting on the applied protections
|Security policy||External YAML configuration or Pragma in the source code|
|Targeted Platforms||Android, iOS, Linux, Windows, OS X, WebAssembly|
|Supported Architectures||ARM, ARM64, x86, x86_64|
|IDE integrations||Apple XCode, Microsoft Visual Studio, & Google Android NDK|
|Sec/Dev/Ops (CI Integrations)||Gitlab, Jenkins|
Reach out to our team for a product demonstration
Payment systems are at the heart of the global economy. Over the past few decades, electronic payments have grown at a fast pace, supplanting traditional payment systems such as cheques and cash to become the current standard. These systems have evolved over the...
The streaming video market is estimated to reach 110 billion euros by 2024, with an average annual growth of almost 20%. Boosted by mobile devices, ever more powerful 4G and soon 5G connections, online video consumption is here to stay. Viaccess-Orca (VO) is one of...
Discover in the infographics below how mobile payment works and what are the risks and threats with the development of payments from mobile platforms. See the infographics: https://bit.ly/3oIhyAO