Solution Overviews

Datasheet: Irdeto Mobile App Protection for Industrial IoT

Issue link: https://resources.irdeto.com/i/1125571

Contents of this Issue

Navigation

Page 1 of 1

www.irdeto.com 2 © 2019 Irdeto. All Rights Reserved. Irdeto is the world leader in digital platform security, protecting platforms and applications for video entertainment, video games, connected transport and IoT connected industries. With 50 years of expertise in security, Irdeto's software security technology and cyber services protect over 5 billion devices and applications for some of the world's best-known brands. Visit www.irdeto.com. KEY TECHNOLOGIES & FEATURES Platform specific protections Anti-debug: Debuggers are one of the most invaluable tools in a hacker's arsenal, giving them full visibility into your app's execution and data. Effective anti-debug is key to frustrating a hacker's efforts. Irdeto has a portfolio of anti-debug variants, the two most relevant to mobile device apps are Signal-based (SBAD) for Android/Linux and Ptrace-based (PBAD) for iOS. Jailbreak, Root detection and Anti-Hooking: Attackers wishing to gain full control over their mobile devices as part of application analysis and tampering will often take advantage of available tools for jailbreaking (iOS) or rooting (Android/Linux) the device. Irdeto Mobile App Protection provides a constantly evolving suite of techniques to frustrate this. Also, Irdeto checks for hooking frameworks and integrity of critical system APIs to combat hooking of the calls. Fingerprinting, secure storage: Irdeto Mobile App Protection provides a flexible library to help you turn device parameters and attributes into a unique fault- tolerant fingerprint that can help ensure your application is running on the device it is licensed to. Additionally, a fingerprint can be used to create a cryptographically secured storage to node-lock your critical secrets and data to a specific device, preventing sharing. Integrity Verification (IV) IV makes sure that your applications cannot be tampered with, either statically or dynamically, without detection. It is a critical element to establish trust in an untrusted environment. Irdeto supports secure generation of both buildtime and runtime IV signatures, so you can deploy a robust IV even in environments, such as iOS bitcode, where the application binary is not finalized at build time. IV provides a set of API calls that can be woven into your application so that checking occurs regularly. These are callback APIs so that if a check fails Irdeto has control of the success path, ensuring that tampered software won't follow the correct program flow. Irdeto Whitebox Cryptography Irdeto's whitebox cryptography implements standard cryptographic algorithms in a way that hides the critical keys even in hostile environments like mobile devices where the hacker may have complete visibility of the cryptographic operations. Popular, trusted ciphers like AES, ECC, RSA, some of the most thoroughly studied algorithms, can be used without fear of whitebox attacks on your application. Whitebox Cryptography can be used in a manufacturing application to secure data and protect communications end-to-end without worry of Man-in-the-Middle (MitM) or spoofing attacks. Image 1: Mobile applications are increasingly used to manage and control processes, assets and software updates on the factory floor. Irdeto Mobile App Protection protects your operations and IP even if a hacker acquires the device. Irdeto Transcoder The Transcoder transforms source code into mathematically modified source, making it significantly more difficult to reverse engineer and decipher. As a pre-compile technique, the Transcoder maintains semantic correctness, ensuring Transcoded applications are functionally identical to the originals but are highly resistant to attack. The protected application reliably executes on target platforms without special hardware or additional software. The Transcoder also links binary level protections and Whitebox Cryptography with the code transformations to deliver interdependent protection that is far more secure than individual techniques alone. The Transcoder can also be used selectively in your applications, with flexible levels of protection, to secure libraries, proprietary software, IP, customer secrets and data. CONTACT US For more information on Irdeto Software Protection visit: https://irdeto.com/cloakware-software-protection/ or contact us via: https://irdeto.com/contact-us/

Articles in this issue

Links on this page

view archives of Solution Overviews - Datasheet: Irdeto Mobile App Protection for Industrial IoT