Obfuscate native as well as non-native code with Appdome

Code Obfuscation for Non-Native apps in minutes

Hello DevSec Community – using Appdome TOTALCode™ Obfuscation you can fully obfuscate non-native mobile apps (built in for example in Maui, Xamarin, Cordova, React Native) in minutes – no coding required.

Introducing Non-Native Code Obfuscation

Now, non-native code obfuscation is available for apps built in React Native, Cordova or Maui, Xamarin. This is huge, because these environments use different coding languages like C#, JavaScript, CSS. Consequently, developers building apps in non-native frameworks need to embed the business logic of their apps outside of where a native iOS or Android application code resides. This means outside the app’s main binary.

TOTALCode Obfuscation always protected the non-native framework itself, where the common runtime logic and methods for any app reside. Non-native code obfuscation, or obfuscating JavaScript and/or DLL files without touching source code, is absolutely *not* trivial. The operating system and the framework loads these files into memory and executes them automatically in order for the app to function. Therefore, developers cannot obfuscate these files manually. That’s impossible.

But Appdome’s unique patented method makes non-native code obfuscation a reality. This means Appdome customers can obfuscate and protect JavaScript and/or DLL files. They can even obfuscate dynamically loaded classes and add arbitrary instructions without impacting the app, and without changing the app’s source code. All the methods combine to thwart any malicious agent that wants to extract or reverse-engineer these files. It is important to note that Appdome is the only solution that can achieve this outcome.

The Industry’s Most Comprehensive App Shielding Solution

Appdome customers get the industry’s most comprehensive app hardening solution for any Android and iOS app. This is achieved by combining anti-tampering, anti-debugging, and other features in Appdome’s ONEShield™ with TOTALCode Obfuscation. Equally important, this solution is available on any app, built is any development framework. By the way, all other obfuscation solutions don’t include anti-tampering and anti-debugging. And TOTALCode Obfuscation has no performance impact to any app. Again something other obfuscation methodologies cannot deliver.

Appdome customers can easily toggle on “Non-Native Code Obfuscation” in the TOTALCode section of the Mobile Security Suite.

Download the TOTALCode Obfuscation datasheet and see how easy it is to enable non-native code obfuscation to your mobile apps.

Mobile application security is in our DNA. We believe every implementation, regardless of the service, deserves protections that make the mobile services safe and protected. Being security engineers, we know that malicious attacks and unwanted intrusions can come from everywhere. It’s no secret that mobile apps are increasingly becoming a vector for attack.

If you are not yet an Appdome user, just sign up for an Appdome account (it’s free!) to try out this new feature.

This blog is part of Appdome’s Mobile Security Basics category, which is appropriate for readers of any level to increase their Mobile security knowledge.

Gil Hartman

Gil heads engineering at Appdome. He's a security engineer, mobile app developer and has fused 1000s of Android and iOS apps.

Have a Security Project?

We Can Help!

TomWe're here to help
We'll get back to you in 24 hours to schedule your demo.

Quick Links for This Blog

Want to learn more?

Stay up to date with the DevSecOps Evolution.

Subscribe to our Mobile DevSec Blogs

More To Explore

Build What You Love Automate What You Don’t

Drop us a line and keep in touch

Search Appdome Solutions

Blog Top 3 Ways Screen Overlay Attacks Are Used for Mobile Fraud

How Attackers Use Overlay Attacks to Commit Mobile Fraud

A Screen Overlay Attack (sometimes also called Clickjacking) is an attack method whereby bad actors and fraudsters uses multiple transparent or opaque layers to trick a user into clicking on a button…