Application Integrity Protection

> SOLUTION > Application Integrity Protection

Summary
Solution

Installs a security function into desktop, server, and mobile applications, and provides a blocking and protection technology to prevent the bypassing and forgery of important functions. Fundamentally eliminates attacks based on function bypassing, security breach, license piracy, etc. through binary code analysis or forgery

Characteristics

Supports various operation and development platform applications.
  • Windows, Linux, Android(ARM, X86), iOS(ARM, X86), Windows Phone, Windows8/RT, Tizen, BlackBerry
Provides the world’s best security.
  • Currently providing an attack-based, defense-in-depth technology to 400 worldwide clients.
  • Continuing to develop new security technologies to protect against new threats.
  • Fundamentally eradicates bypassing of security codes through complex cross-protection configuration among security modules.
Applies security without any source code modification.
  • Security modules are inserted through a binary code insertion method.
  • Possible to immediately apply security without any source code modification.
  • Since the binary code is changed for every build, it is very difficult for hackers to analyze its program architecture, which guarantees the high security capability.
Guarantees high availability with security.
  • After applying security functions through lot testing of the customer’s applications, the customer can retain normal operation and availability of the functions.
  • Deploys and operates a stable solution by eliminating trial and error for availability and security.
Expected Effect
- Maintains high security.
  • Maintains high security by applying security internationally-proven engines.
  • Applies security without failure, which does not allow code forgery or bypassing.

- Improves service reliability.
  • Maintains reliability for security verification and performance by applying multiple security engines.

- Improves management efficiency
  • Continuing to improve the security and performance of our products and applying additional security functions.
  • Maintains fundamental security for security functions that have been applied or that will be applied.
Deployment Method
- After installation on a development system in a software format, security is applied when it is compiled.
- Possible for a developer to apply security simply by compiling, without any separate process.
Reference Sites
Global financial company “A”
Problem
Needed to enforce security for an electronic payment application based on Android and iOS in order to extend services to BRIC countries.
Necessity
Protect internal password logics and keys of applications, important business logics, rooting detection routines, etc. against reverse engineering and forgery.
Application scope
Applied code obfuscation, encryption, forgery detection, rooting/jail-breaking detection, debugging prevention, etc. to protect key application logics (Java and Native codes (Objective C and C++)) based on Android and Apple iOS.
Domestic financial company “H”
Problem
Needed to enforce security for electronic payment applications based on Android and iOS according to the security requirements for electronic financial applications and those specified by the government financial authority.
Necessity
Protects internal password logics and keys of applications, important business logics, rooting detection routines, etc. against reverse engineering and forgery.
Application scope
Applies code obfuscation, encryption, forgery detection, rooting/jail-breaking detection, debugging prevention, etc. to protect key application logics (Java and Native codes (Objective C)) based on Android and Apple iOS.