CrackProof™ for Android™ Award-Winning Record
About CrackProof™ for Android™ SO
CrackProof™ for Android™ SO is security software for anti-tampering*1 processing of any Android apps that contain .so files. It has been developed to protect Android apps from cracking*2, based on the anti-tampering technologies developed in the Windows version of CrackProof™.
Since the anti-tampering processing is completed simply by a drag-and-drop of a target app for security processing, it is possible to introduce security measures without putting extra burden on application developers.
Bank Household appliances manufacturer Security equipment manufacturer
News media Car-navigation manufacturer game manufacturer, etc
Portal sites / Others
Google Play Amazon application stores dmenu(docomo)
au Portal (au) mobage AppStore（Apple） Preinstall to tablets
|AES Encryption||Encrypts program codes of shared object (.so) with AES encryption to prevent disassembling by static analysis (such as objdump).|
|Tampering Check||Prevents tampering with files.|
|Symbol Deletion||Deletes symbols of shared object (.so).|
|Signature Tampering Prevention||Prevents tampering with a signature of package files(.apk).|
|Configuration File Modification Prevention||Detects modification of package configuration files(.apk).|
|Debugger Prevention||Prevents analysis by debuggers while the program is running.|
|Memory Access Prevention||Prevents access to memory.|
|Emulator Prevention||Prevents a program from running on emulators. If the Android SDK emulator is detected, the program will not start. It is effective as a countermeasure against cracking methods to extract memory by executing a program on the emulator.|
|USB Debugging Prevention||Prevents program from running on devices with USB Debugging enabled.If a device with USB Debugging enabled is detected, the program will not start.|
|Rooting Prevention||Prevents a program from running on devices modified to allow root access. The program will not start when its execution is detected on rooted devices. It is effective as a countermeasure against cracking methods used on rooted devices.|
Processable File Format
APK file including .so
CrackProof™ for Android SO is not compatible with Java programs. Please contact us about CrackProof™ for Android DEX if you are planning to develop Java programs.
*CrackProof™ is not available for Multi DEX.
The abovementioned contents including functions may be changed without a notice.
Preprocessing by Obfuscation (recommended)
* Although preprocessing is not essential, we recommend to take this as security can become stronger.
How to Use
1.Upload files to the Cloud
Access to CrackProof cloud server with a web browser and upload apk file.
2.Security processing in the Cloud
CrackProof makes the apk file tamper-resistant automatically in the cloud.
Download the tamper-resistant apk files.
Required environment to run a hardened program (Android devices)
|Version||4.0 or later|
*1 A hardened program will not operate on an operating environment if it is not supported by us.
* 2 We will correspond to a new OS after obtaining devices equipped with the new OS. (Free of charge)However, if there are significant architectural changes, the new OS may not be supported.
* 3 A hardened program is not compatible with Native Activity.
* 4 A hardened program is compatible with multi core CPU.
We will take the following Steps.
1.Explanation on our product / Interview on summary of your consideration →2.Conclusion of Non-disclosure Agreement →3.Interview on details of your consideration →4.Submission of a quotation →5.Trial use of the product*(2 weeks) →6.Placement of order and conclusion of Software Product License Agreement →7.Start formal operation of CrackProof™
*Customer will be asked to provide their application to be hardened to HyperTech, which will be returned to the customer after HyperTech hardens it
The introduction cost will be estimated individually, depending upon the release form and the number of applications to be hardened.
Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions.
The contents of this page are partially duplication of contents produced and provided by Google which are used following to the conditions stipulated in the 3.0 display license of the Creative Commons.