The DexGuard NDK add-on extends all the protection offered by DexGuard — including multi-layered Android app code obfuscation, data obfuscation and RASP integration — to included C/C++ native libraries.
DexGuard generates a Protection Report for each mobile app build that incorporates its protections. This report validates and assesses the applied protections, grading your app’s security configuration against key risk categories, providing further.
When upgrading from ProGuard (or R8) to DexGuard, you can re-use your existing ProGuard configuration file. All you need to do is account for DexGuard’s additional functionality, including its RASP and obfuscation capabilities.
Defend against static
If a threat actor decompiles your app, DexGuard ensures that your code will be as resistant to reverse engineering as possible. DexGuard provides obfuscation for classes, fields, arithmetic instructions and more; code virtualization; API call hiding.
Counter dynamic analysis
DexGuard automatically injects runtime application self-protection (RASP) checks, preventing threat actors from tampering with apps at runtime. What’s more, each build features different RASP checks in different locations, ensuring threat actors can’t reuse prior knowledge. DexGuard injects checks like root detection, certificate checks, hook detection and more.
DexGuard’s defenses against static and dynamic analysis reinforce one another, providing more robust protection overall than any individual approach would offer. When a malicious user runs your app from a debugger or emulator to validate their static analysis, RASP checks kick in to end the user’s session, crash the application and deploy other defensive actions. Furthermore,.
How it works
Learn more about the Android app security techniques, practices and technology DexGuard uses to keep your mobile apps safe.