Software Protection White Papers

Learn more about the best practices in protecting software applications from tampering and malware

Comprehensive Threat Analysis of Mobile Apps - in the Wild!

Comprehensive Threat Analysis of Mobile Apps – in the Wild!

The paper describes prevalent attack risks and recommended mitigation defenses in the following categories: Code Modification or Code Injection Risks and Reverse Engineering and Code Analysis.
7 Key Factors of a Highly Effective Application Protection Solution

7 Key Factors of a Highly Effective Application Protection Solution

This whitepaper discusses the key factors that enable an effective application protection solution -- that mitigates binary code risks and combats the latest security threats.
An iOS Mobile Application Protection Solution

An iOS Mobile Application Protection Solution

Topics in the whitepaper include why hackers are targeting jailbroken environments, background on what jailbreaking is and how it's done, why mobile device and policy management solutions are not sufficient, as well as mitigation strategies.
How to Protect Keys in DRM Systems

How to Protect Keys in DRM Systems

Key discovery is the most prevalent class of threats to content protection systems today, such as digital rights management (DRM) systems, digital cinema encryption protocols or conditional access solutions. It is therefore critical to protect keys. Download the whitepaper to learn how to secure keys in DRM systems.
Protecting Cryptographic Keys

Protecting Cryptographic Keys

Understand the threats to cryptographic keys, a defense-in-depth approach to addressing key vulnerabilities and how to prevent compromise of your enterprise’s intellectual property and customer confidential information. A number of security options that address risk mitigation are also reviewed.
Securing DRM and Multimedia Applications through Guard Technology

Securing DRM and Multimedia Applications through Guard Technology

Mobile applications are uniquely exposed to hacking attacks as the application code must be released "out into the wild." Attackers can directly access, compromise, and exploit the binary code (e.g., analyze or reverse-engineer sensitive code, modify code to change application behavior, or inject malicious code).
Securing Mobile Applications in the Wild with Application Self-Protection

Securing Mobile Applications in the Wild with Application Self-Protection

Mobile applications are uniquely exposed to hacking attacks as the application code must be released "out into the wild." Attackers can directly access, compromise, and exploit the binary code (e.g., analyze or reverse-engineer sensitive code, modify code to change application behavior, or inject malicious code).
Securing Android Applications - What You Need to Know

Securing Android Applications – What You Need to Know

Being a largely open-source platform, Android apps are trivial to reverse engineer as they often rely on system libraries or managed components that are either open source or easily disassembled. In this whitepaper, we review the risk factors for mobile apps, mobile app exploits, and security recommendations for Android apps.
Effective Mobile Application Security Strategies

Effective Mobile Application Security Strategies

Understand the different approaches to securing mobile apps, and why network based tiers of security, such as anti-virus, anti-spam, are less effective for devices outside the enterprise network perimeter.
PC Gaming Alliance

PC Gaming Alliance (PCGA) Security Best Practices

The PCGA believes that this document provides the best known collection of information for protecting PC gaming content and integrity while providing the best possible consumer experience. It covers a very broad number of topics that apply to development, publishing, operations, customer service and legal.
Today's Threats and Strategies for Securing Mobile Games

Today’s Threats and Strategies for Securing Mobile Games

The gaming industry is expected to grow by over 9% in 2015 to $111 billion. Much of this growth is due to the fastest growing segment—mobile gaming. However, many mobile gaming developers have not yet fully begun to understand the ramifications on long term revenue loss that hacking is costing them today.
Multi-Platform Game Protection

Multi-Platform Game Protection

Game hacking is on the rise and millions of dollars in R&D investment can be lost in hours to a successful hack. As online gaming grows and in-game commerce gains prominence, cheating and other forms of compromise can lower the value of a game and further impact revenues.
Protecting .NET Software Applications

Protecting .NET Software Applications

In this white paper, we will discuss best practices and how application protection for Microsoft .NET Framework can provide an arsenal of deep and intrinsic protection techniques for managed and mixed-mode code that durably fortify your code against disassembly, static analysis, dynamic analysis and tampering.
Protecting Java Software Applications

Protecting Java Software Applications

Attacks against Java applications come from many different angles and unfortunately, are easy to carry out given that Java, being an interpreted language, contains program metadata which reveals the inner workings of the application. In this white paper, we review software vulnerabilities of Java code and how to mitigate these risks.
How to Lock Down Your License Management Software

How to Lock Down Your License Management Software

Software vendors often believe that a license management solution alone is adequate to secure their software against unauthorized use and tampering. However, global piracy continues to grow. In this white paper, we review ways to tightly bind security to both applications and license management systems for overall application security.