Page 23 - index
P. 23
obfuscation technologies, which can be quickly broken and easily reversed. Further, any encryption
wrapper that applies the same measures of protection across all the apps it secures can be easily
broken by determined hackers. Remember that once a wrapper technology is broken, every
application secured by that vendor will be compromised.
See chart 1 below for recommended protection techniques for Low and High Value apps
Chart 1: Recommended Protection Techniques
#2: Scale and Sophistication of Attacks Your Apps Will Likely Face
Minimal protections against counterfeiting and repackaging are built into the app distribution
ecosystem -- including measures such as:
Detection of jailbreak or root conditions that enable side-loading of applications, many of
which are Trojanized.
Monetization libraries to confirm that only legitimate applications are downloaded through an
app store and that they are correctly purchased or licensed. However, these libraries can
and are often breached by cybercriminals.
23 Cyber Warnings E-Magazine – October 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide