New with Dotfuscator Professional 4.35.0 and Dotfuscator Community Edition (CE) 5.35.0, developers can, for the first time, inject rooted device detection and response controls into Xamarin.Android apps (injection means the logic is inserted post-compile – no coding required).
Read this month’s MSDN Magazine article, Detect and Respond to Rooted Android Devices from Xamarin Apps that steps you through a detailed explanation of the feature, with links to sample code.
The article takes a sample Xamarin app, TodoAzureAuth authored by Xamarin’s David Britch, and adds rooted device detection and response in a way that maps to the PCI Mobile Payment Acceptance Security Guidelines published on 9/2017.
Specifically,
The sample app highlighted in the article extends the TodoAzureAuth with the behaviors illustrated in figure 1.
Dotfuscator also obfuscates the TodoAzureAuth app to prevent hackers from
The custom code injected by Dotfuscator connects each rooted device detection event with the app owner’s App Center account.
The following Build Output can be stored and used to demonstrate that specific controls were injected on any given release.
All of these controls plus obfuscation are configured through the Dotfuscator UI. Once configured, Dotfuscator can be invoked automatically as part of a continuous build process ensuring that every version of every app is effectively secured.
With the latest release of Dotfuscator, Xamarin.Android developers can rely upon the same application hardening and runtime detection and response controls that classic .NET developers have been able to rely upon for anti-tamper and anti-debugger detection and response.
Attending Microsoft Build during the week of May 7th? Visit booth E61 and we can demo all of the above!