Source code obfuscation software

Obfuscate your high valuable source code and protect your sensitive assets thanks to QShield compiler-obfuscator.
Protect your applications against static and dynamic analysis.

Software running on untrusted environments is at risk of reverse-engineering: an application running on a device which is available to an attacker is vulnerable to a wide range of techniques used to try and extract secrets, intellectual property.

To prevent unauthorised parties from gaining insight, tamper with or even recover the source code from the binary, software protection mechanisms must be implemented to preserve revenues and intellectual property.

Comprehensive software protection for firmware and applications

Code & Data obfuscation

Protection against static analysis

  • 30+ obfuscation schemes available
  • Granular control of the protection profile thanks to a file-based policy or comments throughout the code
  • Build diversification: each compiled application is different with a user-controlled randomness seed

Runtime Application Self-Protection (RASP)

Protection against dynamic analysis

  • Dynamic checks: detection of rooted or jailbroken devices
  • Integrity checks and detection of debuggers, emulators and hooking frameworks
  • Triggering of specific actions on the detection of anomalies

Best-in-class Software Protection

Choose among a large catalog of more than 30 obfuscation passes to protect your application, as well as device trust assessment features. By layering these protection mechanisms throughout software, your intellectual property will stay hidden from prying eyes.

Performance/Security ratio

Protection mechanisms can be applied either all at once or on selected software parts, allowing application developers to fine-tune their security profile depending on their software specific logic, in order to achieve the ideal approach towards allying performance and security.

Extensive professional services

Thanks to QShield flexibility and agility, security officers can design the most appropriate security configuration and count on our team of Subject Matter Experts to support them in achieving their objectives if needed.


Resources

Securing Mobile Payment Applications

PCI CPoC - Mobile Payment

Ready to augment your security operations?

Get in touch with our team for a platform demo.