FUSION

Native Code Hardening, Anti-Tamper, and Obfuscation

Fusion is an automated application protection tool that is designed to protect your code from being modified and used in a way you have not intended.

When tampered with by an attacker, a Fusion-protected application will fail gracefully at run-time and not offer any clues as to why the protected code fails to operate.

How Does Fusion Application Protection Work?

A Fusion-protected binary is injected at build time with thousands of interwoven "check" code instances. These checks validate at runtime that your code has not been modified.

Fusion application protection uses analysis profile data to exclude the most frequently called functions. Additionally, you can easily nominate performance-sensitive areas of code for exclusion of check injection. You have complete control. By using Fusion, you get nearly automatic blending of our protection DNA with your binary.

FUSION application protection highlights:

  • Provides high security by blending your binary with our protection technology at build time
  • Results in a unique per-product fusing so that every protected binary is thoroughly and uniquely protected
  • Features an automated system that you "train" by running special builds

Properly configured Fusion-protected binaries are extremely tedious to attack.

High Security

We blend your binary code with our Fusion at build time making tampering nearly impossible.

Automated

Fusion features an automated system that is "trained" by your team when you run special builds.

Consistent

Process automation results in consistent security results across all teams.

Customized

Nominate performance-sensitive areas of your code for exclusion of check injections. You have complete control.

Fusion Application Protection Advantages

Firstly, the “fusing” of technologies means each product’s code check network is unique and diverse. Contrast this to wrapper-type security, where hackers can invest in building a common set of tools, and repeatedly use those tools to broadly attack all wrapped binaries.

Secondly, Fusion’s intelligent automation produces a protected application with 10X the check code network density vs. manual application protection solutions.

Thirdly, Fusion’s automation produces consistent security results across all your teams. No manual solution can match Fusion for delivering highly secure and performant applications.

Fusion Implementation Steps

Step 1 – Static Analysis - Builds a database of the application's functions

Step 2 – Dynamic Analysis (Exercising) - Creates a database of performance data

Step 3 – Build - Uses data collected in steps 1 and 2 to lay out the optimal check code network topology 

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram