https://shell.virbox.com/androidprotection.htmlProduct Features:
1. Anti-reverse:
Through technologies such as DEX file packing and DEX virtualization, the code is prevented from being decompiled and reverse analyzed.
2. Tamper proof:
By verifying the APK developer’s signature, it prevents secondary packaging, ad or malicious code implantation.
3. Anti-debugging:
Prevent the application from being debugged by tools such as IDA, JEB, and dynamically analyze the code logic.
Core Technology:
1. DEX file encryption and hiding:
Packing protection for DEX files to prevent code theft and decompilation.
2. SO section compression and encryption:
Compress and encrypt the code and data segments in the SO library to prevent decompilation by tools such as IDA.
3. Single step breakpoint detection:
Insert soft breakpoints to detect hidden stakes in obfuscated instructions to prevent run trace and single-step debugging at the native layer.
4. Anti-dynamic debugging:
Prevent the application from being debugged by tools such as IDA, JEB, and dynamically analyze the code logic.
5. Developer signature verification:
Check the developer signature in the APK at startup to prevent third-party cracking and secondary packaging.
6. SO memory integrity check:
Check the memory integrity when loading the SO library to prevent third parties from patching the SO library.
7. SO code obfuscation:
To obfuscate the functions specified in the SO library, through technical means such as instruction slicing, control flow flattening, and immediate encryption, native instructions are converted into complex instructions that are difficult to understand, which cannot be decompiled by IDA and cannot be restored.
8. SO code virtualization:
For the function virtualization specified in the SO library, the machine instructions of the x86, x64, arm32, and arm64 architectures can be converted into random custom virtual machine instructions. The security strength is extremely high. You can customize the configuration through the tool to adjust the performance and security.
9. DEX virtual machine protection (to be launched):
The dalvik bytecode in DEX is virtualized, converted into custom virtual machine instructions, and finally interpreted and executed by the native layer virtual machine to prevent reverse analysis.
Product advantages:
Industry-leading Native layer code obfuscation virtualization technology that does not rely on LLVM, with higher security.
The protected program does not insert any code unrelated to the protection function, and does not collect any user information.
No need to change any development environment, easy to use.
The protection process will not upload any information about the developer and the program.
Before and after protection, there is almost no effect on the size of the APK.