Harden and Tamper-proof Android Apps

It is common knowledge that an Android app is very easy to reverse engineering with freely available tools. Unless the app's binary code is obfuscated, hardened and tamper-proofed, it is easily vulnerable to IP theft, piracy and revenue loss, unauthorized access and fraud, malware threats, counterfeiting, etc.

DashO applies a layered approach to binary code protection using obfuscation, encryption and tamper proofing making your apps more difficult for people and machines to reverse engineer and alter.

Don't take our word for it, Android “highly recommends” obfuscating all code and emphasizes this in a number of specific areas such as: “At a minimum, we recommend that you run an obfuscation tool” when developing billing logic. Microsoft also recommends that all modern apps be obfuscated (see Windows Phone policy) and they also offer a “community edition” obfuscator (our own Dotfuscator CE) as a part of Visual Studio.


Java 1.5, 1.6, 1.7, 1.8, JAR, J2ME, Android SDK 10+, Android 1.6-6.0+, J2EE, WAR, Spring, Gradle, APK

The Best Layered Protection

DashO has the strongest lineup of obfuscation, encryption and tamper-proofing.

Learn More

Try it for Free

Download a free trial version which includes access to our premium support.

Learn More

Application Analytics

DashO makes it easy to instrument your app to add application analytics.

Learn More

Tamper Detection and Response

Get notification and create a custom response if a tampered version of your application is run.

Learn More

Premium Support

Dedicated experts always ready to help on the phone or via email.

Some of the ways DashO Protects Your Apps

  • Renaming alters the names of methods, variables, etc., making source code more difficult to understand.
  • Control flow introduces false conditional statements and other misleading constructs in order to confuse and break decompilers.
  • String encryption allows you to encrypt strings in sensitive parts of your application.
  • Watermarking helps track unauthorized copies of your software back to the source by embedding data such as copyright information or unique identification numbers into an application.
  • Optimize with Pruning which statically analyzes your code to find the unused types, methods, and fields, and removes them making your application smaller and faster.
  • Tamper Detection and Defense allows you to create a custom response and receive notification.
  • Shelf Life allows you to inject application inventory management into your app.