Skip to main content

As mobile computing continues to enjoy explosive growth, so will software apps that are being deployed to attack devices. Whether on Android or Apple iOS, burgeoning app marketplaces are thriving, most often on smart phones using the ARM processor. Given that they are deployed in distributed and un-trusted environments, mobile apps are vulnerable to code based attacks. Hackers routinely seek to subvert software by disassembling and debugging the code to find critical algorithms and then compromise them, which threatens the underlying intellectual property (IP) and business models. To counteract this threat, apps must be hardened to attack with protections that go where the code goes, making code tamper-resistant and tamper-aware. And, since combating hackers is not a one-event occurrence, protections must be architected for durability and resilience, with layered defenses that can easily be refreshed.

Get the data sheet