Safe reinforcement of the shield--extending the security boundary of the Android kernel

Source: Internet
Author: User
Tags account security malware protection

2014 is a watershed and challenging year for mobile payments. With the development of intelligent terminals, especially the popularity of Apple's ipad, iphone and other products, and the rise of Android open system, the traditional mobile terminal market is being subverted. Mobile phone from a can only call, send text message board brick, gorgeous become our Survival "amulet", we use it to shopping, navigation, friends, transfer, ordering, booking, etc., so we finally farewell to the cashier, farewell to the long line, farewell to the Times of the meeting, This is undoubtedly the greatest gospel for us in the fast-food society.

We seem to be safe and sound to enjoy the beauty of mobile finance in such an era, but the reality continues to prove to us that opportunities and risks coexist. In the development of mobile payment, virus, Trojan, code leakage, reverse engineering and other security threats also ensued, in recent years, with a variety of mobile applications have been exposed to the existence of security loopholes caused by the user privacy leaks, property loss and other events, people questioned the security of mobile finance, Therefore, the security problem becomes the key problem that needs to be solved urgently in the development of mobile finance.

As a financial security expert in the mobile internet era, Shang has long been committed to research in the field of mobile application security, and has deeply analyzed the security problems of mobile finance, and formed a set of effective solutions-security reinforcement.

Security hardening is a deep protection service for mobile applications. Through encryption, packers, rpc, dynamic loading and other technology development Android all protection. The reinforced application can effectively prevent malicious behaviors such as reverse engineering, anti-compilation, embedding virus, illegal deduction, illegal Chinese, etc., to ensure the logic security and source code security of the application.

Pass Shield Security hardening provides users with a kernel-level hardening scheme with the following technical features: Key Storage Fragmentation , file manipulation memory , program execution Dynamics , customize ROM optimization rom optimized for Android Security, compatibility threats, providing comprehensive protection for mobile applications.

In addition, the security of the pay shield for the different needs of users, provide "experience version" and "custom version" two types of hardening specifications. Experience version hardening includes dex xml days After expiration expires and prevents malware proliferation in a timely manner; fixed plate reinforcement is based on the experience version to provide deeper, customized protection, including class protection, the API protection, memory protection, So protection, etc., the shield can be based on the reinforcement needs of users, for mobile applications to develop tailor-made reinforcement solutions, targeted to the application of deep reinforcement protection.

compatibility and operational Efficiency is also optimized in all directions. Comprehensive evaluation of the safety reinforcement of the Rom platform fragmentation features a number of optimization processes, through 7 cloud test platform and 1000 different versions, models are adapted and optimized, and the encryption compression technology is used to ensure the pre-reinforcement, After the application volume is similar, basically does not affect the program execution efficiency.

With a wide range of security threats to mobile finance, the pass-through Shield provides a comprehensive and effective solution that extends the security boundaries of the Android kernel. and realize the security of mobile applications at the same time, do not affect the user experience, taking into account security, efficiency, compatibility and other aspects, really for the development of mobile finance escort.


This article is from the "Knight's World" blog, please be sure to keep this source http://9312643.blog.51cto.com/9302643/1543614

Safe reinforcement of the shield--extending the security boundary of the Android kernel

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.