DexGuard_
State-of-the-art protection for Android apps

Hackers can use freely available tools to decompile and inspect your Android applications and SDKs to gain insight into their internal logic. This leaves apps vulnerable to various forms of abuse, including intellectual property theft, cloning, credential harvesting, API key extraction and code tampering.

DexGuard has been designed to protect native (Java, Kotlin)and cross-platform ((Unity, Cordova, Ionic, React Native, etc.)) apps and SDKs for Android against reverse engineering and tampering. DexGuard applies multiple obfuscation and encryption techniques to the code of applications and SDKs and integrates runtime self-protection mechanisms (RASP). The applied layers of protection make it virtually impossible to gain access to their internal logic and to modify their intended behavior Seamless integration

DexGuard enables you to fully protect your application internally. It doesn’t require you to share your source code. DexGuard integrates transparently into the build process and requires no changes to your source code. It comes with plugins for all common build tools and development environments (Gradle, Android Studio, Ant, Eclipse, Maven and custom builds).
DexGuard is backward compatible with ProGuard. This enables you to upgrade easily
DexGuard offers extensive customization options, including customizable encryption algorithms, enabling you to adapt the applied layers of protection to your security and performance needs.
DexGuard
features_
Name obfuscation

DexGuard obfuscates the names of classes, fields, methods and native libraries, as well as the names of resources, resource files, asset files and resource XML attributes.

Control flow obfuscation

DexGuard obfuscates the control flow of the code inside the methods to hinder automated and manual code analysis

Arithmetic obfuscation

DexGuard protects proprietary formulas by transforming simple arithmetic and logical expressions into difficult-to-analyze code.

Data encryption

DexGuard encrypts sensitive strings to prevent hacking attempts through trivial searches. It also encrypts classes, asset files, resource files and native libraries.

Code virtualization

Code virtualization transforms method implementations into instructions for randomly generated virtual machines.

Call hiding

DexGuard adds reflection to access-sensitive APIs, such as the standard Android APIs for signature validation or cryptographic perations.

Native code obfuscation

DexGuard hardens native libraries against reverse engineering and tampering, including the interface between native libraries and application code.

Removal of Android logging code

DexGuard removes logging, debugging and testing code to thwart any attempt at exploiting this information.

DexGuard shields your applications and SDKs against dynamic analysis and live attacks using various runtime self-protection mechanisms (RASP)
SSL pinning

DexGuard makes sure the protected application or SDK is connecting to the intended servers, preventing man-in-the-middle attacks.

Root detection

DexGuard enables your application or SDK to control whether it is running on a rooted device or a device using a root cloaking framework.

Tamper detection

DexGuard enables your application or SDK to detect illegitimate code modifications and to verify the integrity of individual files.

Debugger and emulator checks

DexGuard enables your application or SDK to verify the integrity of its environment by detecting the use of debugging tools and emulators.

Hook detection

DexGuard enables your application or SDK to detect and prevent attempts by hooking frameworks to modify its behavior.

iXGuard_
Cutting-edge protection for your iOS apps

Hackers can use easily available tools to disassemble and inspect your iOS applications and SDKs to gain insight into their internal logic. This leaves apps vulnerable to various forms of abuse, including intellectual property theft, cloning, credential harvesting, API key extraction and code tampering.

iXGuard, iOS için local ( (Objective-C, Swift)and cross-platform (Unity, Cordova, Ionic, React Native, etc.) apps and SDKs for iOS against reverse engineering and tampering. iXGuard applies multiple obfuscation and encryption techniques to the code of applications and SDKs and integrates runtime self-protection mechanisms (RASP). The applied layers of protection make it virtually impossible to gain access to their internal logic and to modify their intended behavior.

iXGuard processes your project as a whole, including libraries and extensions. This enables stronger and more extensive hardening. iXGuard does not require any changes to the source code of your applications or SDKs.
iXGuard has no impact on your development process. It functions as a stand-alone solution that processes your compiled applications. iXGuard is easy to configure. It can be set up to protect entire applications or specific functions with a single configuration file.
iXGuard is a tool that automatically configures your application. in-app assistant provides.
iXGuard
features_
Name obfuscation

iXGuard obfuscates identifiers in both Swift and Objective-C code to hide semantic information from reverse engineers. Most common reflection constructs are supported out of the box.

Arithmetic obfuscation

iXGuard transforms arithmetic statements into more complex but equivalent alternatives to conceal the original computation. The outcome of the transformations is different in every single build.

Data encryption

iXGuard encrypts strings (encryption keys, API endpoints, tokens, etc.) as well as resource and asset files to prevent sensitive data from leaking.

Call hiding

iXGuard hides function call targets to prevent identification of vulnerabilities in the application’s code.

Control flow obfuscation

iXGuard hides the original function logic to better shield your applications and SDKs against automated and manual code analysis.

iXGuard shields your iOS applications and SDKs against dynamic analysis and live attacks using various runtime self-protection mechanisms (RASP)
Jailbreak detection

XGuard lets you determine how your application should react when it is executed on a jailbroken device.

Repackaging detection

iXGuard makes sure your application has not been repackaged by a third party by performing signature-based checks and by comparing additional fields of the binary with the observed state at compile time.

Hook detection

iXGuard enables your application to detect and prevent attempts by hooking frameworks (i.e. Frida, Cydia Substrate and fishhook) to modify its behavior

iXGuard obfuscates identifiers in both Swift and Objective-C code to hide semantic information from reverse engineers. Most common reflection constructs are supported out of the box.

iXGuard integrates environment integrity checks that detect the use of debugging tools into your application or SDK.

Code tracing detection

iXGuard detects and prevents code tracing attempts with dynamic binary instrumentation tools.

ThreatCast_
Gerçek Zamanlı Tehdit İstihbaratı ile Bilinçli Mobil Uygulama Güvenlik Kararları Alın

Bir Android veya iOS uygulaması piyasaya sürüldükten sonra, güvenlik ekipleri ve geliştiriciler genellikle çok geç olana kadar en yaygın saldırı vektörlerini ve kodlarının zafiyet içeren kısımlarını göremezler. Bu görü olmaksızın, bilgisayar korsanları duyarlı müşteri verilerini açığa çıkarabilecek, kodları ve diğer fikri mülkiyet haklarını çalabilecek, finansal veya itibari zararlara neden olabilecek vb saldırıları yapmak için özgürce hareket edebilirler.

Make informed mobile app security decisions with realtime threat intelligence

number
Get actionable insights

Analyze threat data to respond immediately to attacks or block suspicious users.

number
Detect threats in real time

Use easy-to-navigate dashboards and custom alerts to detect threat events as they happen.

number
Integrate security into the development lifecycle

Prioritize mobile security within the development process, without sacrificing speed-to-market.

Analyze environment, application and
code threats with ThreatCast_
Environment threats

These general security threats don’t directly target mobile applications, but are often the basis for targeted attacks. For example, your DexGuard or iXGuard protected application detects that it is being run in a potentially harmful environment—such as a rooted or jailbroken device.

Code threats

These occur when someone attempts to statically or dynamically alter the internal logic of apps and modify their intended behavior. Code threats are the most explicit indicators that malicious users are targeting specific mobile apps.

Application threats

These are related to the integrity of the application, and indicate that there was an attempt to tamper with the application and possibly modify its behavior. If this happens, DexGuard and iXGuard RASP functionality is automatically triggered to respond to the detected threat.

Leverage your ThreatCast data to strengthen app security_
Defend against primary attack vectors

DexGuard and iXGuard help you implement security best practices, while ThreatCast allows you to fine-tune your exact security protocols based on real threats.

Optimize response to runtime analysis and live attacks

Decide - based on objective data - whether an application should terminate, limit the available functionality, or display a notification when a particular subcategory of threats is detected.

Adjust release frequency to strengthen code protection

DexGuard and iXGuard’s applied code protection is different in every build, so attackers must start from zero with each new release. ThreatCast shows you the average time it takes to compromise a new app version, so you can adjust release frequency

Guardsquare is the global leader in mobile application protection. More than 650 customers worldwide across all major industries rely on Guardsquare to secure their mobile applications against reverse engineering and hacking. Built on the open source ProGuard technology, Guardsquare software integrates transparently in the development process and adds multiple layers of protection to Android (DexGuard) and iOS (iXGuard) applications hardening them against both on-device and off-device attacks. With the addition of ThreatCast, its mobile application security console, Guardsquare offers the most complete mobile application security solution on the market today.

other solution partners_

We provide our advanced techonolgy and services to global firms worldwide.