DashO Stops Debugger Exploits

First Post-build Injectable Detection and Defense – Requires no Programing

DashO now offers the first fully injectable debugger defense feature set (no coding required – the behaviors are injected just prior to obfuscation).
dasho laptop screen

The Threats are Real and Immediate

Hackers use Debuggers to:
debugger explanation
Using these techniques, a hacker can gain access to systems and data far beyond any one application. A hacker can view encryption functions and the values of dynamic keys and observe when and how sensitive information is saved to your file systems and databases.

How easy is the debugger exploit?

For the first time, developers can inject the following behaviors into your Java/Android applications (no coding required)

  • Auto-detection that your production code is authorized for debugging and/or attached to a debugger

  • Real-time defense behaviors including immediate exit, random exception generation or custom logic that can change application behavior and/or modify any/all data accessible to the application

  • Real-time alerts to an endpoint of your choosing that can include both application-specific and custom data to better identify and mitigate any potential threat.

debugger exploit icon

How much does this new capability cost?

dasho laptop screen
This functionality is bundled into the standard DashO obfuscation license at no additional expense. If you are already a licensed DashO client with sufficient installations and users, there are no additional fees.
  • Discover how to execute RASP, adding runtime checks in real time.
  • Customize your level of protection for comprehensive source code obfuscation.
  • Supports for Android and Java Applications
  • Mitigate intellectual property loss threats.