Debugging
In the case of trying to access the running app using the debugger.
If there is no AppSealing?
An attacker can use the debugger to step through the app's structure and business logic and to attempt to modify memory, and so on.
How AppSealing protect the app from this hacking type?
Through continuous monitoring of memory and process state, the app will show a toast message and exit within seconds if an attacker attempts to debug.
Code Modification
In the case of launching the app which the code of the installed app is modified.
If there is no AppSealing?
An Attacker can modify business logic to perform unintended actions or attempt to steal customer information, and so on.
How AppSealing protect the app from this hacking type?
The app will show a toast message and exit within seconds if code tampering is detected.
Detour security module
- In the case of launching the app which the security module is modified
- In the case of launching the app which the security module is separated from the app.
- In the case of launching the app in an environment where the security module is not able to work properly.
e.g.)
- Specific system path's permission is abnormal status.
- In the case of launching an app in the WorkProfile environment, or in the Samsung Secure folder.
If there is no AppSealing?
Your app can be exposed to any attack.
How AppSealing protect the app from this hacking type?
The app will show a toast message and exit within seconds if security module tampering is detected or proper device information is not found.
If the security module is separate from the app, the app will not run.
Cheat tool
In the case of launching the app in an environment where various cheat tools such as macros, packet attacks, keylogger, speed hack, and memory attacks are installed.
If there is no AppSealing?
An attacker can use cheat tools to modify the app or try to modify memory.
How AppSealing protect the app from this hacking type?
Through the blacklist managed by AppSealing, the app will show a toast message and exit within seconds if it detects installed cheat tools.
Also, the app will show a toast message and exit within seconds if the security module detects a critical cheat tool's behaviors and features.
Android Emulator
In the case of launching the app in an emulator environment.
If there is no AppSealing?
Because the emulator runs on the PC, it can be exposed to attacks that it cannot block at the app level.
How AppSealing protect the app from this hacking type?
When the app is running, it analyzes the device information to detect the emulator environment. The app will show a toast message and exit within seconds if the emulator environment is detected.
Repackaged application
In the case of launching the app which modified various resources, setting files, codes, etc.
If there is no AppSealing?
An attacker can tamper with business logic, resources, etc., repackage it into the executable app, and distribute the app to others.
How AppSealing protect the app from this hacking type?
Based on the integrity information at the time of application sealing, if the integrity verification fails, the app will show a toast message and exit within seconds.
Speed modification
In the case of trying to control the speed of the running app.
If there is no AppSealing?
An attacker can try to abnormally play by taking advantage of their slow or increased speed.
How AppSealing protect the app from this hacking type?
Through periodic system information and memory monitoring, the app will show a toast message and exit within seconds if speed modification is detected.
Rooted device
In the case of launching the app in a superuser permission environment through device hacking
If there is no AppSealing?
By using superuser permission, an attacker can modify data in areas that are generally not accessible, and the range of attacks will be wide.
How AppSealing protect the app from this hacking type?
The app will show a toast message and exit within seconds if the rooting environment is detected.