In past decades, data security was identified with massive physically secure data centers and corporate controlled computing assets. Today’s reality is that many software applications are running on unmanaged devices in vulnerable and targeted networks.
In past decades, data security was identified with massive physically secure data centers and corporate controlled computing assets. Today’s reality is that many software applications are running on unmanaged devices in vulnerable and targeted networks. Adversaries can easily gain physical access to many devices that need to protect internal secrets, including mobile phones, Internet of Things (IoT) devices, automobiles, set-top boxes, and medical equipment. Even in a well-secured corporate setting, the perimeter is increasingly hard to define and defend because not all devices on a corporate network are adequately managed or secure. Widespread malware deployments make it likely that devices, no matter how well managed, are subject to infection.
The solution to these problems lies with application shielding—technology that prevents reverse engineering, discovery of secret keys, and tampering with code at the application level. Application shielding ensures that the protected software becomes a self-sufficient stronghold that can withstand hacker attacks regardless of where the software is run. Intertrust provides the industry’s best application shielding technology available on the market consisting of a set of specialized tools described below.
Code Protection is a comprehensive application shielding solution intended for hardening software applications on multiple target platforms. It adds anti-reverse engineering and tamper resistant characteristics to applications by applying obfuscation, integrity protection, anti-debug, and anti-piracy techniques to application code. In other words, Code Protection is designed to protect software code against any kind of attacks.
Code Protection can protect applications written in C, C++, Objective-C, Swift, and Java, and requires no significant changes to the code itself or the existing build chain. Most of the security features are automatically added to the application, and the configuration of individual features and security strength is easily accomplished using an intuitive graphical user interface. All the main functions are available through command line for integration into automated build systems.
Some of the main Code Protection security features include:
Secure Key Box is a cross-platform library that provides advanced white box implementation of a number of cryptographic algorithms, such as AES, RSA, SHA, ECC, Speck, CMAC, HMAC, and others. It allows standard cryptographic functions to be performed without the keys ever being in the clear. In simple terms, Secure Key Box is designed to protect cryptographic keys at all times—at runtime, in transit, and at rest.
In the case of existing software applications that already have cryptographic modules in place, Secure Key Box can simply replace those modules in code. Therefore, the protected application will be functionally equivalent to the original application and ensure robust protection of its keys.
Some of the main Secure Key Box security features include:
Visit us at booth #2416 at Black Hat USA 2018 for demos and presentations and talk firsthand with our security experts.