<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
  <channel>
    <title>LIAPP | The easiest and powerful mobile app security solution</title>
    <link>https://liapp.lockincomp.com</link>
    <description>ust one click for source code encryption and obfuscation,Anti-Tamper,Unity protection,rooting detection, string encryption, etc</description>
    <language>ja</language>
    <pubDate>2026-04-04 14:34:54</pubDate>
    <generator>Lockin Company</generator>

          <item>
	<title>&quot;It&#039;s a hospital app, and my medical records have been leaked?&quot;</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/new007-tech-blog</link>
	<description><![CDATA[<p><span style="color: #34495e; font-size: 24pt;"><strong>"It's a hospital app, and my medical records have been leaked?"</strong></span></p>
<p><span style="color: #34495e; font-size: 24pt;"><strong>Protecting Patient Personal Information (PHI) &ndash; The Security Value That Healthcare Apps Must Never Miss</strong></span></p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/202601280518393fsTxQt.jpg"></p>
<p>"I just opened the app to check my medical records... and someone knew my name and medical history."<br>The healthcare app operations team was shocked when they first saw this message. They suspected it was an app error, but soon discovered a shocking truth. While the app the patient was using appeared to be a legitimate medical app on the outside, the problem began when the app's interface itself had been tampered with.<br>In healthcare apps, patient personal information (PHI) isn't just data. It's sensitive data, including names, social security numbers, medical records, and medical history. If leaked, it could lead to privacy violations, legal liability, and even compromise patient safety and trust in healthcare services.</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>Real Case &ndash; PHI Leak, That Moment</strong></span><br>This incident began with a user's report. &bull; Investigations revealed that my medical records and prescription history were being transmitted externally through the app. &bull; Sensitive data, accessible after logging in, was collected by a tampered app. &bull; Patients simply used the app, while the attacker secretly stole the data. In other words, the user trusted the app to be legitimate, but the data was stolen in a tampered app environment.</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>Where did the security breach occur?</strong></span><br>Analysis of the incident revealed that the primary issues were app integrity and inadequate protection of the input section.</p>
<p>Points of Security Breakdown<br>&bull; Insufficient app self-verification &rarr; Enables execution of tampered/repackaged apps.<br>&bull; Insufficient protection of login and sensitive information input sections &rarr; Risk of keylogger attacks.<br>&bull; Users were unable to distinguish between legitimate and fake apps. In other words, the moment the app was launched in an untrusted state, all PHI was at risk.</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>How did LIAPP and LIKEY protect against this incident?</strong></span></p>
<p>This incident could have been completely prevented by simultaneously applying app integrity and input section protection.</p>
<p>&nbsp;</p>
<p><span style="font-size: 14pt;"><strong>LIAPP &ndash; App Forgery and Modification Detection</strong></span><br>&bull;App signature, code, and resource integrity checks<br>&bull;Blocks execution of tampered or repackaged apps<br>&bull;Preemptively blocks attempts to transmit data externally<br>Blocks attacks at the app execution stage before PHI is leaked</p>
<p>&nbsp;</p>
<p><span style="font-size: 14pt;"><strong>LIKEY &ndash; Input Protection</strong></span><br>&bull;Security keypad applied for login and personal information input<br>&bull;Prevents keylogger-based input theft<br>Securely protects sensitive user data</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>Changes after implementation</strong></span><br>&bull;Immediately blocks access attempts to tampered apps<br>&bull;Completely stops PHI leaks<br>&bull;Restores patient trust and reduces complaints<br>&bull;Strengthens internal audit and compliance response systems in medical institutions<br>This case demonstrated that protecting patient information in hospital apps is not simply a legal obligation; it is central to ensuring patient trust and the continuity of healthcare services.</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>Lessons Learned</strong></span><br>Patient personal information (PHI) is not simply data; it is a critical asset directly linked to life.<br>&bull;If the authenticity of an app is not verified, all security measures are nullified.<br>&bull;Without input protection, it becomes vulnerable to keylogger and tampered app attacks.</p>
<p>Protecting PHI begins with "app integrity + input protection," and LIAPP and LIKEY provide practical defense. Trust and safety in medical apps begin here.</p>
<p>#MedicalAppSecurity #PatientInformationProtection #PHISecurity #PersonalInformationLeakage #AppForgeryPrevention #MedicalDataProtection #MobileHealthcare #MedicalInformationSecurity #AppSecurityCases #HospitalITSecurity #Compliance #SensitiveInformationProtection #UserTrust #LIAPP #LISS #LIKEY</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/new007-tech-blog</guid>
	<pubDate>2026-01-28 05:22:36</pubDate>
</item>
          <item>
	<title>The Most Realistic Threat to Growth-Based Games</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/new006-tech-blog</link>
	<description><![CDATA[<p><span style="color: #34495e; font-size: 24pt;"><strong>The Most Realistic Threat to Growth-Based Games</strong></span><br><span style="color: #34495e; font-size: 24pt;"><strong>Game Logic Manipulation Based on Rooting and Jailbreaking</strong></span></p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20260127042055bc33iDR.jpg"></p>
<p>"We played for the same amount of time, but why does that person grow so quickly?"<br>One day, a user playing an idle RPG posted on the community forum.</p>
<p>"There's a user who got a full set of legendary gear in one day. Is that even possible?"</p>
<p>At first, I thought it was due to a difference in in-app purchases. However, upon closer inspection, I began to notice a series of strange things.</p>
<p style="padding-left: 40px;">&bull; Attack power values ​​were out of the normal range.<br>&bull; Cooldowns were virtually nonexistent.<br>&bull; Auto-killing continued 24/7. This wasn't a problem with skill or in-app purchases. It was a sign that the game's operating environment itself was being manipulated.</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>Actual Problem &ndash; Game Logic Manipulation Based on Rooting and Jailbreaking</strong></span></p>
<p>This problem isn't limited to a specific game.</p>
<p>It occurs repeatedly across idle RPGs, growth-based RPGs, and MMORPGs.</p>
<p>Environment Where Attacks Occur</p>
<p style="padding-left: 40px;">&bull; Rooted or jailbroken mobile devices<br>&bull; Or virtual environments or emulators</p>
<p>In these environments, the game app's internal memory can be directly accessed.</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>Where was the security gap?</strong></span></p>
<p>The core of the problem was not the server, but the client execution environment.</p>
<p style="padding-left: 40px;"><span style="font-size: 14pt;"><strong>Actual Attack Method</strong></span><br>1. Running the game on a rooted/jailbroken device<br>2. Using a memory manipulation tool<br>3. Manipulating the following elements in real time:<br>&nbsp; &nbsp; &nbsp;o Attack power value<br>&nbsp; &nbsp; &nbsp;o Reward multiplier<br>&nbsp; &nbsp; &nbsp;o Skill cooldown<br>&nbsp; &nbsp; &nbsp;o Growth rate</p>
<p>If you run auto-hunts under these manipulations, you'll grow at a rate that humans can't keep up with.</p>
<p style="padding-left: 40px;"><span style="font-size: 14pt;"><strong>As a result,<br></strong></span>&bull; Normal users are no match,<br>&bull; Ranking and economic balance collapse,<br>&bull; The perception that "this game has a lot of hacks" begins to spread.</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>How could this problem be prevented?</strong></span></p>
<p>This type of attack is directly defendable with LIAPP.</p>
<p>&nbsp;</p>
<p><span style="font-size: 14pt;"><strong>Applied Solution: LIAPP</strong></span></p>
<p>LIAPP verifies the game's execution environment.</p>
<p style="padding-left: 40px;"><strong>How did LIAPP protect against this?</strong><br>① Rooting/Jailbreak Detection<br>&nbsp; &nbsp; &nbsp;&bull; Real-time verification of device rooting/jailbreak status<br>&nbsp; &nbsp; &nbsp;&bull; Immediate blocking if determined to be a risky environment<br>② Virtual environments/emulator detection<br>&nbsp; &nbsp; &nbsp;&bull; Identification of emulators used for multiple accounts and automation<br>&nbsp; &nbsp; &nbsp;&bull; Restriction of execution on non-normal devices<br>③ Blocking execution of apps in risky environments<br>&nbsp; &nbsp; &nbsp;&bull; Access is not limited to actions only<br>&nbsp; &nbsp; &nbsp;&bull; Game execution itself is completely blocked</p>
<p>This prevents memory modification from reaching the level of protection.</p>
<p>&nbsp;</p>
<p><span style="font-size: 18pt; color: #ba372a;"><strong>Actual Changes After Defense</strong></span></p>
<p>The changes observed after LIAPP implementation were clear:</p>
<p style="padding-left: 40px;">1. A sharp decline in abnormal growth accounts<br>2. Elimination of hacking based on automated hunting<br>3. Stabilization of the top rankings<br>4. Decreased churn rate of legitimate users</p>
<p>Most importantly, the perception that "using hacks is profitable" has disappeared.</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>Lessons from this Case</strong></span></p>
<p>First, a secure server does not guarantee a safe game.<br>Most game hacking begins in the client execution environment.</p>
<p>Second, rooting and jailbreaking are not "advanced hacking," but basic tools.<br>For attackers, rooting is not a barrier to entry.<br>If left unchecked, anyone can use it.</p>
<p>Third, if the execution environment is not controlled, the game's balance will be disrupted.</p>
<p>For games with a growth mindset, environmental control is crucial for the game's longevity.</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>In Conclusion</strong></span></p>
<p>In idle RPGs and MMORPGs, "rapid growth" equates to competitiveness and revenue.<br>If this competitive advantage is lost on rooted and jailbroken devices, the game will ultimately be abandoned by legitimate users.</p>
<p>LIAPP is a security solution that protects the "environment" in which the game runs, before protecting the game logic itself.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>#GameSecurity#MobileGameSecurity#IdleRPG#MMORPGSecurity#GameHacking#RootingJailbreak#AutomaticHuntingCheat#GameLogicManipulation#MobileHacking#GameOperation#GameDevelopment#SecuritySolution#LIAPP#LISS#LIKEY#GameSecurityCases#GameHackBlocking</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/new006-tech-blog</guid>
	<pubDate>2026-01-27 04:25:58</pubDate>
</item>
          <item>
	<title>&quot;That Person Was Actually Fake&quot;</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/new005-tech-blog</link>
	<description><![CDATA[<p><span style="color: #34495e; font-size: 24pt;"><strong>"That Person Was Actually Fake"</strong></span><br><span style="color: #34495e; font-size: 24pt;"><strong>Story of Personal Information Leaked Through Fake and Counterfeit Dating Apps</strong></span></p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20260127011342ZXR5cFy.jpg"></p>
<p>"At first, I had absolutely no suspicions. The profile looked natural, and the chat flowed smoothly."<br>This is the story of "A," an ordinary dating app user. The dating app, downloaded from the app store, had a familiar UI and seemed functional.<br>Uploading photos, creating a profile, and even exchanging messages with a partner felt like a "real app."<br>But a few days later, strange things started happening. I received notifications for signing up to an unused overseas website, mysterious messages, and private conversations that seemed to be shared with someone.<br>The problem was simple: the app wasn't a "real dating app."</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>The Real Problem &ndash; Typical Fake App Techniques</strong></span></p>
<p>The attacker copied a legitimate dating app and distributed a repackaged fake app. Actual Attack Method</p>
<p style="padding-left: 40px;">&bull; Repackaging of legitimate dating app APK<br>&bull; Exact replication of login, profile, and chat UI<br>&bull; Transmission of user-entered information (photos, conversations, and location) to an external server</p>
<p>From the user's perspective, they "just installed and used the app," but in reality, the following information was being passed on to the attacker:</p>
<p style="padding-left: 40px;">&bull; Profile photo<br>&bull; Chat conversation contents<br>&bull; Location information<br>&bull; Login account information</p>
<p>Due to the nature of dating apps, this information is not just personal information; it's a matter of privacy itself.</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>Where did the security breach occur?</strong></span></p>
<p>The core of this incident is surprisingly simple.</p>
<p style="padding-left: 40px;">&bull; The app's authenticity was not verified.<br>&bull; The screen UI could not be verified as authentic or altered.<br>&bull; The user had no way to determine whether the app was fake or not.</p>
<p>In other words, it was a classic mobile security incident: "The moment you trust an app, your security is gone."<br>No matter how strong the server security, the moment a user runs a fake app, all protections are nullified.</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>How did LIAPP and LIKEY protect against this?</strong></span></p>
<p><span style="color: #000000; font-size: 12pt;">This type of attack can only be prevented by simultaneously protecting both the app itself and the input section.</span></p>
<p>&nbsp;</p>
<p><span style="font-size: 14pt;"><strong>LIAPP &ndash; Counterfeit App (Repackaged App) Detection</strong></span></p>
<p>LIAPP checks, "Is this app genuine?" from the moment the app is launched.</p>
<p style="padding-left: 40px;">&bull; App signature, code, and resource integrity checks<br>&bull; Immediately identifies apps different from officially distributed apps<br>&bull; Blocks execution of repackaged and modified apps<br>&bull; Disabling fake login and chat UIs</p>
<p>Blocks the fake app itself from running</p>
<p>&nbsp;</p>
<p><span style="font-size: 14pt;"><strong>LIKEY &ndash; Protects Personal Information Input Sections</strong></span></p>
<p>Even if an attacker targets input information, LIKEY protects the input section itself.</p>
<p style="padding-left: 40px;">&bull; Implements a secure keypad for login and profile input<br>&bull; Blocks input theft based on keyloggers and screen captures<br>&bull; Protects user input data</p>
<p>Keeps photo, account, and profile input sections secure</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>What's changed since then?</strong></span></p>
<p>The changes after applying security were clear. &bull; Immediately blocking attempts to access fake apps</p>
<p style="padding-left: 40px;">&bull; Stopping personal information leaks<br>&bull; Reducing user churn<br>&bull; Restoring trust that "this app is safe"</p>
<p>This case once again confirmed that the most important asset in dating apps is not functionality, but trust.</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>Final Lesson</strong></span></p>
<p>In dating apps, personal information isn't just data.</p>
<p style="padding-left: 40px;">&bull; Photos are faces,<br>&bull; Chats are private, and<br>&bull; Location is directly related to real-world security.</p>
<p>If an app isn't authenticated, no personal information is safe.<br>Blocking fake apps isn't an option, it's a prerequisite.<br>And that prerequisite becomes reality only when LIAPP and LIKEY accurately fulfill their respective roles.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>#DatingAppSecurity#FakeAppRisk#FakeAppDetection#PersonalInformationLeakCases#MobileSecurity#AppForgeryDefense#DatingAppRiskFactors#PersonalInformationProtection#MobileAppSecurity#SecurityCaseAnalysis#UserTrust#AppSecurityImportant#SecurityIsAPrerequisite#LIAPP#LISS#LIKEY</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/new005-tech-blog</guid>
	<pubDate>2026-01-27 01:17:35</pubDate>
</item>
          <item>
	<title>&quot;I just took a selfie...&quot;</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/new004-tech-blog</link>
	<description><![CDATA[<p><span style="color: #34495e; font-size: 24pt;"><strong>"I just took a selfie..."</strong></span><br><span style="color: #34495e; font-size: 24pt;"><strong>A story of facial images and personal information leaked through a fake beauty app</strong></span></p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20260127010537vwus1RS.jpg"></p>
<p>"I just took a photo to analyze my skin. After that, I started receiving strange text messages."<br>This story began with a beauty app user.</p>
<p>Recently, beauty apps have become so comfortable with camera-based features like skin tone analysis, pore diagnosis, and makeup recommendations.<br>So, this user installed the app without any suspicion and took a selfie without hesitation.<br>The app screen was familiar, and the functions worked normally.<br>There was only one problem:<br>This app wasn't "real."</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>"It looks like a legitimate app, so what could be the problem?"</strong></span><br>Investigation revealed that this app wasn't distributed on the official app store, but a fake, repackaged version of a legitimate beauty app.<br>The icon was the same, the UI was the same, and the skin analysis flow was the same.<br>But something completely different was happening under the hood.</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>The Actual Problem</strong></span><br>The fake beauty app worked as follows:<br>&bull; A legitimate beauty app was repackaged and distributed.<br>&bull; The face capture and profile input screens were duplicated.<br>&bull; The user's facial images and personal information were then sent to an external server, simultaneously with normal function processing. From the user's perspective, they simply granted camera access, but in reality, both their facial images and personal information were being leaked.</p>
<p>The damage was particularly severe because the facial data was not simply a photograph, but rather high-risk personal information that could be used as biometric information.</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>Where did the security breach occur?</strong></span><br>The core of the problem was clear.<br>&bull; The app was not verified as an officially distributed app,<br>&bull; and there was no way to verify the authenticity of the face capture screen. In other words, the biggest security vulnerability was that "the moment you trusted the app, you handed over all permissions."</p>
<p>Users were cautious, but there was no technical means to distinguish between the two.</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>How was the defense implemented?</strong></span></p>
<p><span style="font-size: 14pt;"><strong>LIAPP &ndash; Detecting Counterfeit Apps (Repackaged Apps)</strong></span><br>LIAPP was the first solution to address this issue.</p>
<p>LIAPP identifies apps that differ from officially distributed apps by checking: &bull; app signatures, &bull; code structure, and &bull; resource integrity at app launch time.</p>
<p>This allows it to:<br>&bull; block the execution of repackaged fake apps,<br>&bull; neutralize the fake face capture UI, and<br>&bull; completely block access within the fake app environment.</p>
<p>Users can no longer take selfies within the fake app.</p>
<p>&nbsp;</p>
<p><span style="font-size: 14pt;"><strong>LIKEY &ndash; Personal Information Input Protection</strong></span><br>Not only facial images, but also names, contact information, and profile information were protected.</p>
<p>LIKEY<br>&bull; provided a secure keypad for profile information entry,<br>&bull; neutralized keylogger-based input theft.</p>
<p>This protected input information from external sources, even within legitimate app environments.</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>What changed after that?</strong></span><br>The changes following the security measures were clear:<br>&bull; Immediately blocked access attempts to fake beauty apps<br>&bull; Stopped leaks of facial images and personal information<br>&bull; Relieved user anxiety<br>&bull; Restored brand trust</p>
<p>The most important change was this: A shift from the "user must be careful" approach to the "app must protect the user."</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>Lessons from this case</strong></span><br>In beauty apps, facial data isn't simply a functional element.<br>Facial data isn't just a "photo," it's "personal information."</p>
<p>&nbsp;</p>
<p><span style="font-size: 14pt;"><strong>Therefore, the following are crucial:</strong></span><br>&bull; Verify the authenticity of the app first<br>&bull; Ensure the captured image isn't tampered with<br>&bull; Protect input information at all times<br>No matter how good a feature is, it can't be used without trust.</p>
<p>The starting point for beauty app security is "verification of authenticity," not functionality.</p>
<p>#BeautyAppSecurity#FakeAppWarning#FakeApp#PersonalInformationLeakage#FacialInformationProtection#PrivacySecurity#MobileSecurity#AppForgery#RepackagedApp#SelfieSecurity#CameraPermissions#MobileAppSecurity#SecurityCases#ITSecurityStory#SecurityTrends#LIAPP#LISS#LIKEY</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/new004-tech-blog</guid>
	<pubDate>2026-01-27 01:10:42</pubDate>
</item>
          <item>
	<title>&quot;Why can&#039;t I get the coupon?&quot;</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/new003-tech-blog</link>
	<description><![CDATA[<p><strong><span style="font-size: 24pt; color: #34495e;">"Why can't I get the coupon?"</span></strong></p>
<p><strong><span style="font-size: 24pt; color: #34495e;">A real-life story of an automated attack on a shopping app</span></strong></p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20260127003457867m5Ga.jpg"></p>
<p>"I clearly set an alarm, but the moment I logged in, it was already closed?"</p>
<p>Similar inquiries began repeatedly coming into a shopping app's customer service center. They included first-come-first-served discount coupons, live commerce-exclusive points, and limited-quantity events. Strangely, only a few users were consistently successful, while most were always a step behind.</p>
<p>At first, I thought it was simply a surge in traffic. The server was slow due to the high traffic during the event.</p>
<p>But something was off.</p>
<p>Always at the same time, always with similar accounts, always at speeds that humans couldn't handle.</p>
<p>That's when the operations team realized,<br>"This isn't just a traffic issue."</p>
<p><span style="color: #e03e2d; font-size: 18pt;"><strong>Why are shopping apps so lucrative for attackers?</strong></span><br>Shopping apps aren't just content apps.<br>&bull; Discount coupons<br>&bull; Points<br>&bull; Payment information<br>&bull; Shipping information<br>&bull; Seller transaction data<br>All of these are directly linked to real-world monetary value.</p>
<p>Therefore, from an attacker's perspective, a successful shopping app is a target that immediately generates revenue. Among these, the first to be targeted were monetary resources like discounts, coupons, and points.</p>
<p><span style="font-size: 18pt;"><strong><span style="color: #e03e2d;">Actual Attack Methods</span></strong></span><br>The problem was fully revealed after log analysis.<br><span style="font-size: 14pt;"><strong>Confirmed Attack Patterns</strong></span><br>&bull; Mass collection of coupons using automated clicks and macros<br>&bull; Abnormal, repeated calls to the event participation button<br>&bull; Modification of the app to bypass point deduction logic<br>On the surface, it appeared to be a legitimate app user, but in reality, an automated tool and a modified app were being used simultaneously.</p>
<p>Where was the security vulnerability?</p>
<p><span style="font-size: 14pt;"><strong>This shopping app had a single problem:</strong></span><br>"We couldn't distinguish between normal and abnormal user behavior."<br>&bull; The server only received requests.<br>&bull; The app trusted the execution environment.<br>&bull; There was no standard for distinguishing automation from modification.<br>This is where app security became necessary.</p>
<p><span style="color: #e03e2d; font-size: 18pt;"><strong>LIAPP: The First Line of Defense Against Monetary Resource Attacks</strong></span><br>Detecting Automated Input and Script-Based Attacks<br>LIAPP doesn't just look at what the user entered, but how they entered it. &bull; Touch interval<br>&bull; Input speed<br>&bull; Repeat cycle<br>&bull; Event call pattern<br>Input rhythms that humans cannot achieve ultimately reveal themselves as automated attacks.<br>Automated click and macro accounts began to be detected using this method.</p>
<p>App forgery and tampering detection<br>Some attackers were more sophisticated.<br>&bull; They repackaged legitimate apps,<br>&bull; modified the point deduction logic,<br>&bull; and participated in events as legitimate users.</p>
<p>LIAPP's forgery and tampering detection identifies the execution of tampered apps based on changes to<br>&bull; code<br>&bull; resources<br>&bull; and app structure.</p>
<p>Tampered apps targeting coupons and points were no longer able to enter the normal flow.</p>
<p>"Coupons weren't the only problem."</p>
<p><span style="color: #e03e2d; font-size: 18pt;"><strong>Why LISS and LIKEY emerged</strong></span><br>As the investigation progressed, another truth emerged:<br>Attackers don't just target coupons.</p>
<p><span style="font-size: 14pt;"><strong>LISS &ndash; Remote Support Tool Detection</strong></span><br>Screen manipulation using remote support apps was detected in some operations and seller accounts. Through LISS, we:<br>&bull; detected remote support and remote control tools<br>&bull; blocked external manipulation risks of critical accounts.</p>
<p><span style="font-size: 14pt;"><strong>LIKEY &ndash; Account and Input Information Protection</strong></span><br>Another weakness was the login input section.<br>By implementing LIKEY's secure keypad,<br>&bull; we neutralized keylogger-based input theft<br>&bull; and strengthened the protection of administrator and seller accounts.</p>
<p><span style="color: #e03e2d; font-size: 18pt;"><strong>What changed after implementation?</strong></span><br>Changes occurred faster than expected after implementing security.<br>&bull; Normalized coupon and point distribution<br>&bull; Naturally shifted the distribution of event-related accounts<br>&bull; Reduced customer complaints<br>&bull; Reduced operational team response burden<br>The most important change was this:</p>
<p>We shifted from focusing solely on the server when a problem arose to focusing on both the app execution environment and user behavior.</p>
<p><span style="color: #e03e2d; font-size: 18pt;"><strong>Lessons from this case</strong></span><br>The biggest misconception in shopping app security is this: "Just block the server."</p>
<p>However, actual attacks originate in the app, mimicking user behavior and quietly stealing financial resources.</p>
<p><span style="color: #e03e2d; font-size: 18pt;"><strong>So, what's needed?</strong></span><br>&bull; Automation and forgery detection &rarr; LIAPP<br>&bull; External manipulation detection &rarr; LISS<br>&bull; Input information protection &rarr; LIKEY<br>By clearly dividing roles, security becomes less complex and more effective.</p>
<p>#ShoppingAppSecurity#MobileSecurity#CouponAbusiveUse#EventSecurity#MacroDetection#AutomatedAttacks#AppForgery#RASPSecurity#E-CommerceSecurity#SellerAppSecurity#AccountProtection#FintechSecurity#MobileAppSecurity#SecurityCases#SecurityTrends#LIAPP#LISS#LIKEY</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/new003-tech-blog</guid>
	<pubDate>2026-01-27 00:42:57</pubDate>
</item>
          <item>
	<title>&quot;My balance increased?&quot;</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/new002-tech-blog</link>
	<description><![CDATA[<p><span style="color: #34495e; font-size: 24pt;"><strong>"My balance increased?"</strong></span></p>
<p><span style="color: #34495e; font-size: 24pt;"><strong>Hooking-based balance and limit manipulation: The most dangerous attack that can cripple a financial app</strong></span></p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/202601260735524PSrcje.jpg"></p>
<p>"My balance is clearly insufficient, but the payment was made."<br>One day, the customer service center of fintech app A, which offered both simple payment and microloan features, began receiving a steady stream of strange inquiries.<br>At first, they thought it was a simple mistake or user misunderstanding. However, the inquiries became increasingly specific.<br>✔ The payment was approved even though the balance was 0 won.<br>✔ The loan limit suddenly increased.<br>✔ All transactions appeared normal on the app screen.</p>
<p>The operations team immediately checked the server logs and payment records.<br>However, the results were unexpected.<br>- The server logs were perfectly normal.<br>- The payment approval/rejection logic was also fine.<br>- There were no signs of external intrusion.<br>"This is strange... There's clearly nothing wrong with the server. Why is this happening?"</p>
<p><span style="color: #e03e2d; font-size: 18pt;"><strong>The Real Problem - The "App," Not the Server, Was Being Deceived</strong></span><br>As the investigation continued, the security team discovered a common thread. Most of the affected accounts were accessed from a specific Android environment.<br>A close analysis revealed that the attackers did not compromise the server.<br>Instead, they were manipulating the app itself running on the user's smartphone.</p>
<p><span style="font-size: 14pt;"><strong>The actual attack method was as follows:</strong></span><br>&bull; Using a hooking tool to access memory while the app was running.<br>&bull; Forcibly changing the return value of the balance/limit query function. o Return false &rarr; Return true<br>&bull; The app screen displayed "Insufficient balance."<br>&bull; Payment/transfer requests were sent to the server as if they were legitimate users.</p>
<p>In other words,<br>the server was not fooled, but the app had already been manipulated.<br>The server received a "normal request," the user confirmed "normal approval," and in the meantime, a financial incident occurred.</p>
<p><span style="color: #e03e2d; font-size: 18pt;"><strong>Why is this attack particularly virulent in financial apps?</strong></span></p>
<p>The reason hooking-based attacks are so dangerous is because, on the surface, everything appears normal.</p>
<p>✔ Users are reassured by the confirmation screen.&nbsp;</p>
<p>✔ Server logs show no abnormalities.&nbsp;</p>
<p>✔ Small payments can be repeated without notice.&nbsp;</p>
<p>✔ Damage accumulates, and identifying the cause is delayed.</p>
<p>&nbsp;</p>
<p>Especially in financial and fintech apps, these attacks aren't simply bugs; they directly lead to a breakdown in trust.<br>&bull; &nbsp; &nbsp;Customers think, "I can't trust this app."<br>&bull; &nbsp; &nbsp;Financial institutions are exposed to internal audit and regulatory risks.<br>&bull; &nbsp; &nbsp;Trust, once lost, is difficult to regain.</p>
<p>At this point, the operations team realized a crucial truth:<br>"Server security alone is not enough to protect financial apps."</p>
<p><span style="color: #e03e2d; font-size: 18pt;"><strong>A Shift in Direction &ndash; Protect the App Itself</strong></span><br>Company A completely changed its strategy:<br>"If an attack originates from the app, the app must be protected."</p>
<p><span style="color: #000000; font-size: 12pt;">This is how they implemented a mobile security system centered on LIAPP, LIKEY, and LISS.</span></p>
<p><span style="font-size: 18pt; color: #ba372a;"><strong>LIAPP &ndash; Making the App Execution Environment Trustworthy</strong></span><br>First and foremost was LIAPP.</p>
<p><span style="font-size: 14pt;"><strong>LIAPP Implementation Details</strong></span><br>✔ Runtime Integrity Check<br>&rarr; Real-time verification of app code and memory modifications<br>✔ Hooking and Debugging Detection<br>&rarr; App Termination Upon Detection<br>✔ Memory Manipulation Blocking<br>&rarr; Balance and Limit Inquiry Function Modification Prevented<br>✔ Abnormal Environment Access Restrictions<br>&rarr; Blocking Rooting, Emulators, and Hacking Tool Environments<br>&bull; ✔ Automated Input and Macro Pattern Detection<br>&bull; ✔ Fake Screen Overlay Attack Neutralization</p>
<p>In particular, an additional integrity check was applied immediately before payment and remittance, protecting the entire payment flow.</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>LIKEY &ndash; Secure from Authentication to Input</strong></span><br>The operations team went one step further. "What if an attacker steals login information?" So, they also implemented **LIKEY (Mobile Security Keypad**.</p>
<p><span style="font-size: 14pt;"><strong>LIKEY's Role</strong></span><br>✔ Key input encryption<br>✔ Blocks keylogger-based theft<br>✔ Protects login, password, and payment authentication sections<br>This blocked the entire path from account theft to hooking attacks.</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>LISS &ndash; Prevents information exposure through the screen</strong></span><br>Finally, LISS was added.</p>
<p><span style="font-size: 14pt;"><strong>LISS Application Effects</strong></span><br>✔ Blocks screen capture and screen recording<br>✔ Blocks external overlay apps<br>This eliminated the possibility of externally leaking balance, limit, and payment information.</p>
<p><span style="font-size: 14pt;"><strong>Results &ndash; "No More Hacks"</strong></span><br>After implementing the security measures, the results were clear.<br>✔ Completely blocked attempts to manipulate balances and limits<br>✔ Maintained zero payment anomalies<br>✔ Passed internal security audits by financial institutions<br>✔ Restored user trust</p>
<p>This response was even confirmed in the illegal community:<br>"This app can no longer be hooked."</p>
<p>Only then did the operations team breathe a sigh of relief.</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>Lessons from Financial App Security</strong></span><br>The lesson Company A learned from this incident was clear:<br>Financial app security isn't about "server protection," but about "trust preservation."<br>&bull; Securing servers alone isn't enough.<br>&bull; Protecting the network alone isn't enough.<br>&bull; The apps in users' hands must be secure.</p>
<p><span style="color: #ba372a; font-size: 14pt;"><strong>Minimum Security System for Financial and Fintech Apps</strong></span><br>The following are no longer optional for financial apps, but rather fundamental:<br>&bull; LIAPP &rarr; App integrity, hooking, and forgery prevention<br>&bull; LIKEY &rarr; Authentication and input information protection<br>&bull; LISS &rarr; Screen and information leak prevention<br>These three are not separate functions, but a single security system for operating financial services.</p>
<p>#FinancialAppSecurity #FintechSecurity #MobileFinancialSecurity #FinancialSecurityCases #FintechAccidentCases #HookingAttacks #MemoryManipulation #BalanceManipulation #LoanLimitManipulation #PaymentManipulation #FinancialHacking #AppHooking #MobileHackingCases #LIAPP #LIKEY #LISS #MobileAppSecurity #AppIntegrityCheck #ForgeryPrevention #RepackagingBlocking #HookingDetection #SecurityKeypad #FintechOperation #FinancialServiceOperation #SecurityAudit #FinancialRegulatoryResponse #SecurityIncidentResponse #TrustBasedService #MobileSecuritySolution #FintechStartup #FinancialPlatform #ElectronicFinancialSecurity #MobilePaymentSecurity<br>#EasyPaymentSecurity</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/new002-tech-blog</guid>
	<pubDate>2026-01-26 07:48:00</pubDate>
</item>
          <item>
	<title>Why Can&#039;t We Prevent Leaks of Lecture Videos from Education Apps?</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/new001-tech-blog</link>
	<description><![CDATA[<p><span style="font-size: 24pt; color: #34495e;"><strong>Why Can't We Prevent Leaks of Lecture Videos from Education Apps?</strong></span></p>
<p><span style="font-size: 24pt; color: #34495e;"><strong>A Real-World Case Study (LIAPP&middot;LISS Implementation Review)</strong></span></p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20260126072327kDp6r3H.jpg"></p>
<p>"Lecture videos are floating around on Telegram."</p>
<p>For anyone running an online education service, this single sentence alone will send a shiver down your spine.</p>
<p>Indeed, Company A, which operated an online education platform, received a report one day to its customer service center.</p>
<p>"Your lecture videos are being shared in Telegram chatrooms."</p>
<p>"PDF textbooks are also being circulated."</p>
<p>At first, they suspected internal employee error or data management issues. However, no matter how much they searched internal logs, they found no abnormalities.<br>In the end, the problem wasn't "external," but "regular students' smartphones."</p>
<p><span style="color: #e03e2d; font-size: 18pt;"><strong>Leaks of Educational App Content Are Easier Than You Think</strong></span><br>Many education app operators think,<br>"Our app requires logins, payments, and access is only possible through the app. How could it possibly be leaked?"<br>But the reality is different.<br>Leaks of content from education apps occur in much simpler ways than you might imagine.</p>
<p><span style="font-size: 14pt;"><strong>The most commonly used methods:</strong></span><br>&bull; ✔ Using screen capture/screen recording apps<br>&bull; ✔ Recording screen mirroring via remote control apps<br>&bull; ✔ Removing DRM from tampered apps<br>&bull; ✔ Directly extracting video files from an emulator<br>Educational apps, especially Android-based apps, are often operated with little security due to the misconception that "just installing the app means it's safe."</p>
<p>Company A also implemented a standard player + login, resulting in lecture videos being recorded as is.</p>
<p><span style="color: #e03e2d; font-size: 18pt;"><strong>Why Did Existing Response Methods Not Work?</strong></span><br>After the issue arose, Company A quickly took action.</p>
<p><span style="font-size: 14pt;"><strong>The methods Company A initially attempted included:</strong></span><br>&bull; ✔ Inserting a watermark into the video player<br>&bull; ✔ Applying web-based DRM<br>&bull; ✔ Strengthening the warning text in the Terms of Use regarding illegal data leakage.<br>However, the results were largely unchanged.</p>
<p><span style="font-size: 14pt;"><strong>The reason was simple:</strong></span><br>&bull; Watermarking does not prevent leakage.<br>&bull; Web DRM has limitations in the mobile app environment.<br>&bull; Terms of Use cannot be technically blocked.</p>
<p>In other words, they simply said, "Do not record," but failed to create an environment that prevents recording.</p>
<p><span style="color: #e03e2d; font-size: 18pt;"><strong>A Fundamental Solution: Simultaneous Application of LIAPP and LISS</strong></span><br>Company A ultimately changed course.<br>"Instead of responding after a leak, let's create a structure that prevents leaks from the start." That choice was the simultaneous application of LIAPP and LISS.</p>
<p><span style="font-size: 14pt;"><strong>LIAPP &ndash; Protecting the App Itself</strong></span><br>LIAPP is a service that protects the integrity of the app and its execution environment.<br>LIAPP Features Applied to Company A<br>&bull; ✔ Integrity check upon app launch<br>&bull; ✔ Blocking rooting and emulator environments<br>&bull; ✔ Detection of hacking tools used for video extraction<br>&bull; ✔ Overlay blocking<br>From now on, apps modified for illegal purposes will no longer run.<br>The method of extracting video files from emulators was also immediately blocked during app launch.</p>
<p><span style="font-size: 14pt;"><strong>LISS &ndash; Protecting the Screen Itself</strong></span><br>But Company A didn't stop there.<br>"What if I record the screen in a normal app environment?"<br>LISS was the solution to this problem. Changes Made Possible with LISS Implementation<br>&bull; ✔ Real-time screen capture blocking<br>&bull; ✔ Screen recording app detection and blocking<br>&bull; ✔ Remote control/mirroring app detection<br>In other words, even if the app is functioning properly, "screen recording itself is now impossible."</p>
<p>From the student's perspective, this may only feel like "captures are suddenly unavailable," but from the operator's perspective, a key barrier to content protection has been created.</p>
<p><span style="color: #e03e2d; font-size: 18pt;"><strong>Results: Visible Changes</strong></span><br>After implementing security, Company A's situation clearly changed.<br>&bull; ✔ Virtually zero cases of illegal video leaks<br>&bull; ✔ Over 70% reduction in customer inquiries regarding copyright<br>&bull; ✔ Alleviation of instructor anxiety and contract retention<br>&bull; ✔ Preservation and resale of content value</p>
<p>An operations team member stated,<br>"For the first time, I realized that protecting lectures is more important than creating them."</p>
<p>Protecting Educational Content is No Longer an Optional Thing<br>Security is no longer an afterthought in educational apps. &bull; Content equals revenue.<br>&bull; Content leaks equal a loss of trust.<br>&bull; Loss of trust leads to service collapse.<br>The moment content is sold, security becomes a fundamental requirement, not a feature.</p>
<p><span style="color: #e03e2d; font-size: 18pt;"><strong>Three Security Pillars for Protecting Education Services</strong></span><br>To operate an education app safely, a single security system is needed, not a single feature.<br>&bull; LIAPP: App Integrity, Anti-Forgery and Repackaging, Overlay Blocking<br>&bull; LISS: Screen Capture and Recording, Remote Support Detection<br>&bull; LIKEY: Input Information Protection (Account, Payment, Authentication)<br>These three are not separate solutions, but a single line of defense that protects the content, revenue, and trust of an education service.</p>
<p>While creating a course takes months, a leak only takes minutes.<br>If you're operating an education app, now is the time to re-evaluate your security.</p>
<p>#EducationalAppSecurity #ElearningSecurity #OnlineLectureSecurity #EducationalContentProtection #LectureVideoLeakage #BlockIllegalCapture #BlockScreenRecording #MobileAppSecurity #AntiAppForgery #BlockRepackaging #RootingDetection #BlockEmulators #MobileSecuritySolution #LIAPP #LISS #LIKEY #EduTechSecurity #ContentCopyrightProtection #EducationPlatformOperation #EducationAppCase #SecurityCase #AppSecurityCase #LecturePlatform #MobileDRM #EducationStartup #EduTech #ServiceSecurity #CorporateMobileSecurity</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/new001-tech-blog</guid>
	<pubDate>2026-01-26 07:30:44</pubDate>
</item>
          <item>
	<title>Preventing Location Information Falsification – A Case Study of Using LIAPP for Mobile App Security</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/69-tech-protecting-apps-from-hackers</link>
	<description><![CDATA[<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20251119063257ySsKyVQ.png"></p>
<p><span style="color: #34495e; font-size: 24pt;"><strong>Preventing Location Information Falsification &ndash; A Case Study of Using LIAPP for Mobile App Security</strong></span></p>
<p>Hello. Today, I'd like to share a case study of protecting apps from hackers who manipulate location information (GPS) in mobility-based services to gain illegal benefits.</p>
<p>In particular, I'll share a real-world experience of successfully detecting and blocking GPS spoofing apps through the application of the mobile security service LIAPP.</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>Problem: Location-based services misused through GPS manipulation</strong></span><br>Mobility services often have different fares depending on the user's location or offer benefits that are only available in certain areas.<br>However, the following malicious attempts have recently been discovered:</p>
<p>&bull; Using GPS manipulation apps to disguise movement to a false location<br>&bull; Unauthorized participation in fake location-based rewards and events without actual movement<br>&bull; Falsifying driving and commuting records to receive unauthorized allowances and fares<br>Hackers exploited these services by manipulating and transmitting the device's location information using separate GPS fake apps or virtualization tools with location alteration capabilities. This damage resulted in disadvantages for honest users and a decline in service reliability.</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>Countermeasures: Detecting and Blocking Location Falsification with LIAPP</strong></span><br>To counter these location manipulation threats, we introduced the mobile security service LIAPP, establishing a system for detecting GPS falsification and blocking it based on environmental analysis.</p>
<p>&nbsp;</p>
<p><span style="font-size: 14pt;"><strong>Key Security Features of LIAPP Application</strong></span></p>
<p>1. Location Information Forgery Detection<br>&bull; Real-time analysis of abnormal fluctuation patterns in device GPS information<br>&bull; Detection of Mock Location usage<br>&bull; Detection and blocking of apps or frameworks that induce location falsification</p>
<p>2. Virtual Environment and Rooting Detection<br>&bull; Detection of rooted devices and virtual devices commonly used for GPS manipulation<br>&bull; Blocking execution in emulator environments<br>&bull; Blocking plugins that bypass rooting and location manipulation</p>
<p>3. App Execution Integrity Verification<br>&bull; Detection of GPS-related code forgery and modification attempts<br>&bull; Detection of app repackaging and blocking execution</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>Application Results</strong></span></p>
<p>After implementing LIAPP, the service operations team experienced the following tangible benefits:</p>
<p>&bull; Blocking over 89% of location manipulation attempts<br>&bull; Improved detection rate for mock location and GPS spoofing apps<br>&bull; Maintaining zero instances of false driving records and reward abuse<br>&bull; Restoring user trust and improving app ratings<br><span style="color: #ba372a;">Most importantly, the system maintained the user experience for legitimate users while precisely detecting only malicious manipulation.</span></p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>In conclusion</strong></span></p>
<p>Location-based services are a key feature that provide convenience and a user-centric experience, but they also carry the constant risk of forgery and manipulation.</p>
<p>With LIAPP, we've implemented a security system that goes beyond simply checking GPS information to comprehensively analyze the execution environment, app integrity, and user behavior logs, enabling us to provide a more stable and reliable service.</p>
<p>If you operate an app service where location information is crucial, we strongly recommend considering preemptive security measures through LIAPP.</p>
<p>#LIAPP #LIAPPApplicationCase #MobileAppSecurity #AppSecurity #MobileSecurity #MobileSecuritySolution #GPSSpoofing #GPSSpoofingPrevention #LocationManipulationBlocking #LocationSpoofing #LocationInformationSecurity #LBSSecurity #MockLocationDetection #ForgeryDetection #AppForgeryPrevention #RepackagingBlocking #IntegrityCheck #RootingDetection #RootingBlocking #VirtualEnvironmentDetection #EmulatorBlocking #HackingToolDetection #RuntimeProtection #O2OSecurity #MobilitySecurity #MobileServiceSecurity #FraudPrevention #PreventionOfFraud #BlockingFraud #SecurityLogAnalysis #ThreatAnalytics #EnvironmentBasedDetection #LocationBasedServiceSecurity #LBSServiceOperation #CustomerInformationProtection #EnhanceServiceReliability</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/69-tech-protecting-apps-from-hackers</guid>
	<pubDate>2025-11-19 06:38:30</pubDate>
</item>
          <item>
	<title>Blocking User Information Collection through Fake Apps – A Case Study of LIAPP, a Mobile App Security Service</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/68-tech-Blocking-User-Information-Collection</link>
	<description><![CDATA[<p><span style="color: #34495e; font-size: 24pt;"><strong><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20251119062356OwKCRIb.png"></strong></span></p>
<p><span style="color: #34495e; font-size: 24pt;"><strong>Blocking User Information Collection through Fake Apps &ndash; A Case Study of LIAPP, a Mobile App Security Service</strong></span></p>
<p>Hello. Today, we'd like to share a case study of a company operating an O2O (Online to Offline) mobile service. They recognized the threat of user information collection through fake apps and effectively blocked it with the mobile security service LIAPP.</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>The Issue: The Emergence of "Fake Apps" Impersonating Brands</strong></span><br>Recently, a popular O2O app operating in Korea has begun receiving unusual complaints from users.<br>Users have reported complaints such as, "I logged in through the app, but my points disappeared," and "I feel like my personal information has been leaked." Our investigation confirmed that fake apps disguised as official apps are being distributed.</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>Key characteristics of fake apps:</strong></span></p>
<p>&bull; Disguised with the same icon, name, and UI as the official app<br>&bull; Distributed through separate marketplaces (unofficial channels)<br>&bull; Sending user input information to external servers<br>&bull; Involved in malicious activities such as advertising revenue generation, account hijacking, and location data collection<br>Notably, customers were unaware of the counterfeit nature of the app because it was so similar, and this threatened to damage the image of the official app.</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>Countermeasures: Establishing a system to detect counterfeit apps and prevent user misuse using LIAPP</strong></span><br>To counter this threat, the company immediately adopted the mobile app security service LIAPP, establishing a multi-layered security system that verifies app integrity, detects forgery, and blocks execution.</p>
<p><span style="font-size: 14pt;"><strong>Key Features of LIAPP Implementation</strong></span></p>
<p>1. Detect app forgery and repackaging<br>&bull; Perform integrity checks upon app execution<br>&bull; Detect repackaging (app code modifications and redistribution)<br>&bull; Forged apps are immediately terminated and notifications are processed</p>
<p>2. Protect the execution environment and detect hacking tools<br>&bull; Detect debugging tools, hooking attempts, and malicious frameworks<br>&bull; Block analysis tools commonly used in fake apps</p>
<p>3. Integration with a system to prevent user abuse<br>&bull; Restrict user access in abnormal execution environments<br>&bull; Collect and analyze security event logs<br>&bull; Automatically filter out users who abuse the app through marketing/operation databases</p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>Application Results</strong></span><br>After implementing the LIAPP security module, the following effects were confirmed:</p>
<p>&bull; Successfully detected and blocked fake apps distributed on unofficial app markets<br>&bull; Maintained zero login and personal information theft incidents through fake apps<br>&bull; Established a proactive blocking system for suspected users based on user abuse logs<br>&bull; Reduced customer service inquiries by 47%, restoring user trust<br><span style="color: #ba372a;">Above all, a company values ​​its brand. We've successfully protected our image and customer trust, and we've also secured the secure management of customer location and payment information, which are crucial for O2O services.</span></p>
<p>&nbsp;</p>
<p><span style="color: #ba372a; font-size: 18pt;"><strong>In conclusion</strong></span></p>
<p>Recently, sophisticated counterfeit apps that mimic official apps have been on the rise. Many attacks disguise themselves as legitimate apps, but steal user information or target advertising revenue. In an era where "app imitation" itself poses a security threat, simple UI blocking or antivirus software alone is inadequate.<br>LIAPP's mobile security features are essential, verifying the integrity and authenticity of apps in real time and preventing counterfeit apps from even running on user devices.</p>
<p>Take the first step toward protecting your brand and customer trust with LIAPP today.</p>
<p>#LIAPP #LIAPPApplicationCase #MobileAppSecurity #AppSecurity #MobileSecurity #MobileSecuritySolution #AppForgeryPrevention #RepackagingBlocking #IntegrityCheck #FakeAppDetection #FakeAppBlocking #MaliciousAppDetection #AppRepackaging #TamperingPrevention #BrandImpersonation #HackingToolDetection #DebuggingBlocking #HookingBlocking #ReverseEngineeringProtection #O2OSecurity #O2OServiceSecurity #PersonalInformationProtection #CustomerInformationProtection #AccountProtection #SecurityLogAnalysis #ThreatSignals #RuntimeProtection #UserAbusePrevention #MaliciousUserBlocking #FraudPrevention #SecureMobileService #AppIntegrity #AntiFraud #BrandProtection #CorporateSecurityStrengthening</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/68-tech-Blocking-User-Information-Collection</guid>
	<pubDate>2025-11-19 06:29:49</pubDate>
</item>
          <item>
	<title>Detecting Account Theft and Abnormal Payments – A Case Study of LIAPP Applications for Mobile App Security</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/67-tech-Detecting-Account-Theft-and-Abnormal-Payments</link>
	<description><![CDATA[<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20251119061644xtleHLo.png"></p>
<p><span style="font-size: 24pt; color: #34495e;"><strong>Detecting Account Theft and Abnormal Payments &ndash; A Case Study of LIAPP Applications for Mobile App Security</strong></span></p>
<p>Hello. Today, we'd like to share a real-world example of how LIAPP was implemented in a mobile shopping app to detect and block account theft and abnormal payments.</p>
<p>As the mobile commerce environment becomes increasingly sophisticated, hackers targeting customer personal information and payment systems are also becoming more sophisticated. Therefore, a proactive security response is becoming increasingly essential.</p>
<p>&nbsp;</p>
<p><strong><span style="font-size: 18pt; color: #ba372a;">Challenge: Account theft and unauthorized payment attempts</span></strong><br>The following security threats have recently been identified in live mobile shopping apps:</p>
<p>&bull; Illegal logins using externally collected IDs and passwords<br>&bull; Abnormal payment attempts and exploitation of discount and coupon systems<br>&bull; Unauthorized item purchases using rooted devices or automated tools<br>If these threats lead to actual transactions, they can lead to not only customer harm but also damage to the company's brand reputation and financial losses. The problem is that these attempts are disguised as legitimate user behavior, making detection difficult.</p>
<p>&nbsp;</p>
<p><span style="font-size: 18pt;"><strong><span style="color: #ba372a;">Solution: Strengthening Security with LIAPP</span></strong></span><br>To fundamentally address security issues, we introduced the mobile app security service "LIAPP" and enhanced the following security features:</p>
<p><span style="font-size: 14pt;"><strong>LIAPP Key Features</strong></span></p>
<p>1. Hacking Tool Detection and Blocking<br>&bull; Automated login/payment tools are detected and app execution is blocked.</p>
<p>&bull; Detects reverse engineering, debugging, and hooking attempts.</p>
<p>&bull; Prevents malicious SDK insertion and repackaged app execution.</p>
<p>&nbsp;</p>
<p>2. Rooting Environment and Unauthorized Access Detection<br>&bull; Blocks execution on rooted devices or virtual environments.</p>
<p>&bull; Also responds to bypass rooting detection techniques (root masking blocking).</p>
<p>&bull; Detects access using network proxies and VPNs.</p>
<p>&nbsp;</p>
<p><span style="font-size: 18pt;"><strong><span style="color: #ba372a;">Changes After Implementation</span></strong></span><br>Since implementing LIAPP, the security of the mobile shopping app has significantly improved:</p>
<p>&bull; Account theft attempt blocking rate improved by over 92%<br>&bull; Strengthened server-to-app verification for abnormal payment requests<br>&bull; Maintained zero customer losses and reduced customer support inquiries<br>&bull; Increased platform reliability and passed internal security audits.<br>Notably, we successfully maintained a balance between user experience (UX) and security by precisely responding to only abnormal accesses without inconveniencing legitimate users.</p>
<p>&nbsp;</p>
<p><span style="font-size: 18pt;"><strong><span style="color: #ba372a;">In conclusion,</span></strong></span></p>
<p>Account theft and unauthorized payments are not just security threats; they pose serious risks that threaten customer trust and service sustainability.</p>
<p>Implementing security through LIAPP not only blocks short-term threats, but also stabilizes security operations in the long term by establishing a systematic tracking system based on security logs.</p>
<p>If you operate a mobile app, we strongly recommend implementing a specialized security solution like LIAPP to protect against threats that may occur within your app at any moment.</p>
<p>#LIAPP #LIAPPApplicationCases #MobileAppSecurity #AppSecurity #MobileSecurity #MobileSecuritySolution #AppSecurity #ApplicationSecurity #ClientSideSecurity #AppForgeryPrevention #TamperingPrevention #IntegrityCheck #RuntimeProtection #InAppProtection #SecurityHardening #RootingDetection #RootingBlocking #RootingDetection #EmulatorDetection #HackingToolDetection #AutomationToolBlocking #AutomationToolDetection #DebuggingBlocking #HookingDetection #ReverseEngineeringProtection #AccountTheftPrevention #AccountTakeoverPrevention #CredentialStuffing #AccountTakeover #FraudLoginPrevention #AbnormalPaymentDetection #FraudPrevention #PaymentSecurity #TransactionSecurity #MobileFraudPrevention #CommerceSecurity #ShoppingAppSecurity #SecureMobileCommerce<br>#PrivacyProtection #CustomerInformationProtection #ThreatDetection #AntiFraud #DefenseInDepth #SecuritySolution #EssentialForAppOperators #SecurityEnhanced<br>#CommerceOperations #SecurityLogs #ThreatSignals</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/67-tech-Detecting-Account-Theft-and-Abnormal-Payments</guid>
	<pubDate>2025-11-19 06:20:19</pubDate>
</item>
          <item>
	<title>Blocking Unauthorized Access by Detecting Rooting and Emulators – A Case Study of LIAPP, a Mobile App Security Service</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/66-tech-Blocking-Unauthorized-Access</link>
	<description><![CDATA[<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20251119005058AxbunMn.png"></p>
<p><span style="color: #34495e;"><strong><span style="font-size: 24pt;">Blocking Unauthorized Access by Detecting Rooting and Emulators &ndash; A Case Study of LIAPP, a Mobile App Security Service</span></strong></span></p>
<p>&nbsp;</p>
<p>Hello!</p>
<p>Today, we'd like to share a real-world example of how LIAPP, a security service, addressed security threats posed by mobile apps, specifically unauthorized access via rooted devices and virtual environments (emulators).</p>
<p>With the proliferation of various mobile services in finance, commerce, and public sectors, everything from checking accounts, transferring money, making payments, and authenticating accounts can now be done with just a smartphone. However, behind this convenience lies a security vulnerability that hackers exploit.</p>
<p><br><span style="font-size: 18pt;"><strong><span style="color: #ba372a;">Case Situation: Attacks Exploiting Rooting and Emulator Environments</span></strong></span></p>
<p>One recent security threat involves attempts to access accounts illegally, collect automated information, and insert malware through apps running on rooted Android devices or PC-based emulators.</p>
<p>These attacks were characterized by:</p>
<ul>
<li>Breaking down the app's security perimeter on rooted devices</li>
<li>Repeated account takeover attempts using automated scripts in emulators</li>
<li>Bypassing security policies and manipulating authentication or payment processes</li>
<li>Automating information leaks by running the app in parallel with malicious apps</li>
</ul>
<p>This resulted in the exposure of user account information, authentication tokens, and session information, potentially leading to unknowing remittance and payment fraud. This was a very dangerous situation.</p>
<p>&nbsp;</p>
<p><strong><span style="font-size: 18pt; color: #ba372a;">Response: Rooting and Emulator Detection and Blocking with LIAPP</span></strong></p>
<p>To address this issue, we introduced LIAPP, a specialized mobile app security service.</p>
<p>LIAPP provides real-time environment detection and behavior-based analysis capabilities that can respond to various threat scenarios, ensuring the security of the app execution environment.</p>
<p>&nbsp;</p>
<p><span style="font-size: 18pt;"><strong><span style="color: #ba372a;">Summary of Applied Features</span></strong></span></p>
<p><span style="font-size: 14pt;"><strong>1. Rooting Detection and Blocking</strong></span></p>
<ul>
<li>Detects system domain changes, su command usage, and root-privileged apps.</li>
<li>Immediately halts app execution and issues a warning upon detection of rooting.</li>
<li>Precisely detects rooting bypass techniques (masking, root cloaking, etc.)</li>
</ul>
<p><br><strong><span style="font-size: 14pt;">2. Emulator Detection and Blocking</span></strong></p>
<ul>
<li>Virtual environment detection based on device profiling</li>
<li>Blocks execution of major emulators such as BlueStacks, Nox, and Genymotion</li>
<li>Prevents PC-based automation tools and repetitive bot attacks</li>
</ul>
<p><br><strong><span style="font-size: 14pt;">3. Unauthorized Access Behavior Analysis</span></strong></p>
<ul>
<li>Detects abnormalities such as unauthorized networks and debugging connections</li>
<li>Integrates server logs and blocks abnormal user behavior</li>
<li>Configures administrator notifications when security events occur</li>
</ul>
<p>&nbsp;</p>
<p><strong><span style="font-size: 14pt;">4. Prevents app forgery and tampering and protects the execution environment</span></strong></p>
<ul>
<li>Repackaging and malware Disabling embedded apps</li>
<li>Automatically terminates apps if anomalies are detected after an integrity check</li>
<li>Improving app security without user interaction</li>
</ul>
<p><br><span style="font-size: 18pt;"><strong><span style="color: #ba372a;">Implementation Results</span></strong></span></p>
<p>Since implementing LIAPP, the app's security has been significantly improved:</p>
<ul>
<li>100% blocking app execution in rooted and emulator environments</li>
<li>Real-time analysis of unauthorized access attempt logs strengthens the proactive response system</li>
<li>Maintaining zero account hijacking and authentication bypass attempts</li>
<li>Many users have expressed trust in the app</li>
<li>Highly evaluated in internal audits and external security reviews</li>
</ul>
<p><span style="color: #ba372a;">Most importantly, the app has been able to thoroughly respond only to attackers without inconvenience to legitimate users.</span></p>
<p>&nbsp;</p>
<p><span style="font-size: 18pt;"><strong><span style="color: #ba372a;">In conclusion</span></strong></span></p>
<p>Rooting detection and emulator blocking are not mere options; they are fundamental and essential elements of mobile service security.</p>
<p>Especially in financial, commerce, and authentication-based apps, a single security incident can threaten trust, users, and even revenue. Therefore, a proactive security response system that keeps apps safe is crucial even at this very moment.</p>
<p>LIAPP provides comprehensive security features, from the execution environment to internal logic and server integration. If you want to protect the core assets of your mobile app, join LIAPP.</p>
<p>&nbsp;</p>
<p>#LIAPP #LIAPP #RootingDetection #RootingBlocking #EmulatorDetection #EmulatorBlocking #AppSecurity #MobileSecurity #SecuritySolution #UnauthorizedAccessBlocking #AutomatedAttackPrevention #BotPrevention #AppForgeryPrevention #IntegrityCheck #DebuggingBlocking #FinancialAppSecurity #PublicAppSecurity #CommerceAppSecurity #MobileSecurityCases #SecurityApplications #HackingPrevention #AppSecurityEnhanced #AndroidSecurity</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/66-tech-Blocking-Unauthorized-Access</guid>
	<pubDate>2025-11-19 01:27:12</pubDate>
</item>
          <item>
	<title>In-App Purchase Protection Case Study to Prevent Automatic Payment Bypass – Introduction of LIAPP</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/65-tech-In-App-Purchase-Protection</link>
	<description><![CDATA[<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20251119005032f8c2Lqm.png"></p>
<p><strong><span style="font-size: 24pt; color: #34495e;">In-App Purchase Protection Case Study to Prevent Automatic Payment Bypass &ndash; Introduction of LIAPP</span></strong></p>
<p>&nbsp;</p>
<p>Hello!</p>
<p>Today, we'll introduce a case study of strengthening payment security in a mobile game app. Specifically, we'll explain how LIAPP effectively prevented hackers from bypassing in-app purchases (IAPs) to obtain paid items without authorization.</p>
<p>&nbsp;</p>
<p><strong><span style="font-size: 18pt; color: #e03e2d;">Payment bypassing in game apps is a real thing.</span></strong></p>
<p>When operating a mobile game, you may occasionally discover unusual payment histories. Some of these attacks occur through the following:</p>
<ul>
<li>Manipulating the in-app purchase (IAP) screen to obtain items without payment.</li>
<li>Falsifying payment response values ​​to deceive the server.</li>
<li>Rooting the device and manipulating the app's internal payment logic.</li>
<li>Integrity threats using illegal marketplaces or hacking tools.</li>
</ul>
<p>If left unchecked, these attacks can lead to not only revenue loss but also the loss of legitimate paying users. These threats are especially critical for RPGs, strategy games, and collectible games, where item value is high.</p>
<p><br><span style="font-size: 18pt;"><strong><span style="color: #e03e2d;">Background for the Introduction of LIAPP: The Need for In-App Purchase (IAP) Protection</span></strong></span></p>
<p>After recognizing automated payment bypasses and integrity attacks using hacking tools, our team introduced 'LIAPP,' a specialized mobile security service, to strengthen app security.</p>
<p>LIAPP is a security service optimized for protecting in-app payments, providing features that go beyond simple code protection to include integrity verification of the actual payment flow and server-linked security.</p>
<p>&nbsp;</p>
<p><span style="font-size: 18pt; color: #e03e2d;"><strong>Security Features Applied</strong></span></p>
<p><strong><span style="font-size: 14pt;">1. Payment logic protection and tamper prevention</span></strong></p>
<ul>
<li>Encryption and obfuscation of in-app payment-related code</li>
<li>Detects rooting, hooking, and debugging attempts to halt payments</li>
<li>Repackaged apps are blocked from running &rarr; Illegal APKs are blocked</li>
</ul>
<p><br><span style="font-size: 14pt;"><strong>2. Implements server-linked payment verification logic</strong></span></p>
<ul>
<li>After payment is completed, communicates with the server to re-verify the actual payment</li>
<li>Compares Google/Apple server responses with our own logic</li>
</ul>
<p><br><span style="font-size: 14pt;"><strong>3. Security event logs and monitoring</strong></span></p>
<ul>
<li>Identifies and blocks users exhibiting abnormal behavior</li>
</ul>
<p>&nbsp;</p>
<p><span style="font-size: 18pt;"><strong><span style="color: #e03e2d;">Changes since implementation</span></strong></span></p>
<p>Since implementing LIAPP, we have experienced the following results:</p>
<ul>
<li>Abnormal payment rate reduced by approximately 96%</li>
<li>Increased access blocking rate for users using illegal APKs</li>
<li>Attempts to acquire in-game paid items without authorization Block</li>
<li>We've received numerous positive user feedback, including "high payment security."</li>
<li>We've also passed the app security certification process in both store and platform reviews.</li>
</ul>
<p><span style="color: #e03e2d;">The best part is that we were able to enhance security without compromising the normal user experience.</span></p>
<p><br><span style="font-size: 18pt;"><strong><span style="color: #e03e2d;">In conclusion</span></strong></span></p>
<p>As the mobile gaming industry grows, payment security has become a key element directly related to game profitability.</p>
<p>LIAPP not only protects the payment process, but also comprehensively addresses the integrity of the entire app, rooting/hacking prevention, and server integration verification, making the mobile payment environment much safer.</p>
<p>If you're running a game app, we recommend strengthening your payment security with LIAPP right now. Protecting paid content is essential to preserving the value of your game.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>#LIAPP #LIAPP #In-App Payment Protection #IAP Security #Payment Bypass Prevention #Mobile Game Security #Game Security #App Security #Payment Hacking Prevention #Rooting Blocking #Hooking Blocking #Debugging Blocking #Integrity Verification #APK Forgery Prevention #Illegal APK Blocking #Security Solution #Game Operation #Mobile Security #Game Development #Game Service Operation #Security Implementation Case #App Integrity Protection #Payment Security Enhancement</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/65-tech-In-App-Purchase-Protection</guid>
	<pubDate>2025-11-19 01:17:47</pubDate>
</item>
          <item>
	<title>Preventing Information Exposure by Blocking Third-Party App Access – LIAPP and LISS: A Case Study of Public Institution Mobile Security</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/64-tech-Preventing-Information-Exposure</link>
	<description><![CDATA[<p><span style="font-size: 24pt;"><strong><span style="color: #34495e;"><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20251119005007YEKFCiZ.png"></span></strong></span></p>
<p><span style="font-size: 24pt;"><strong><span style="color: #34495e;">Preventing Information Exposure by Blocking Third-Party App Access &ndash; LIAPP and LISS: A Case Study of Public Institution Mobile Security</span></strong></span></p>
<p><br>Hello!</p>
<p>Today, we'll introduce a real-world security case study of LIAPP and LISS, which effectively prevented the leakage of sensitive personal information by blocking third-party app access in public institution mobile apps.</p>
<p>With the widespread adoption of smartphone-based administrative services, various public institution apps are now handling highly sensitive personal information, such as resident registration numbers, addresses, health information, and financial data. Security vulnerabilities in these apps can lead to catastrophic data leaks, making preemptive response essential.</p>
<p>&nbsp;</p>
<p><strong><span style="font-size: 18pt; color: #e03e2d;">Threat Factors: Overlay Attacks and Third-Party App Access</span></strong></p>
<p>Common smartphone features like multitasking, split screens, and pop-up overlay apps can sometimes be exploited. Some malicious apps steal sensitive information by secretly overlaying a transparent screen (overlay) over a running app, intercepting keystrokes or capturing or copying internal app information.</p>
<p>These attack techniques can manifest in the following ways:</p>
<ul>
<li>Stewing input data, such as account numbers and passwords, during keyboard input</li>
<li>Phishing attacks disguised as pop-up windows</li>
<li>UI and data leaks through screen capture</li>
<li>Apps running in the background accessing clipboard or memory information</li>
</ul>
<p>Given the nature of public agency apps, these attacks, if left unchecked, are highly likely to lead to a loss of policy trust and massive user damage.</p>
<p><br><span style="font-size: 18pt;"><strong><span style="color: #e03e2d;">Background for the Introduction of LIAPP &amp; LISS: Blocking Third-Party App Access and Strengthening Screen Protection</span></strong></span></p>
<p>To further enhance security for public agency apps, we have introduced the mobile application security solution LIAPP and the mobile content and screen protection solution LISS.</p>
<p>Due to the nature of public services, which involve sensitive data entry, authentication procedures, and internal business functions, there have been persistent attempts to intercept the UI or display overlays to collect information from outside the app.</p>
<p>Accordingly, we have built an integrated security system that combines "App Protection (LIAPP)" and "Screen Protection (LISS)" to simultaneously respond to various threats, including external app access, overlays, and screen capture.</p>
<p>&nbsp;</p>
<p><span style="font-size: 14pt;"><strong>By applying these two services together, we were able to simultaneously implement:</strong></span></p>
<ul>
<li>blocking third-party app overlays and touch injections;</li>
<li>preventing screen capture and recording;</li>
<li>preventing hooking, debugging, and forgery;</li>
<li>protecting the app UI and preventing exposure of sensitive information;</li>
<li>enhancing content output and screen layer security.</li>
</ul>
<p>This enabled us to reliably meet the security requirements required for operating public institution services.</p>
<p>&nbsp;</p>
<p><span style="font-size: 18pt;"><strong><span style="color: #e03e2d;">Feature Details</span></strong></span></p>
<p><strong><span style="font-size: 14pt;">1. Overlay Detection and Blocking</span></strong></p>
<ul>
<li>Immediately detects when another app overlaps the UI while the app is running.</li>
<li>If an overlay is detected, the user is warned and the app is automatically terminated.</li>
<li>Detects transparent overlays, advertising apps, and keylogger apps.</li>
</ul>
<p><br><strong><span style="font-size: 14pt;">2. Screen Capture Prevention</span></strong></p>
<ul>
<li>Prevents capture and recording of sensitive information areas within the app.</li>
<li>Protects clipboard access and prevents copying.</li>
<li>Detects and restricts the execution of screen recording apps.</li>
</ul>
<p><br><strong><span style="font-size: 14pt;">3. App Forgery, Hooking, and Debugging Prevention</span></strong></p>
<ul>
<li>Prevents app execution if tampered with or repackaged.</li>
<li>App protection actions are triggered when hooking tools, rooted devices, or debuggers are connected.</li>
<li>Integrated with real-time threat detection and administrator log forwarding.</li>
</ul>
<p><br><span style="font-size: 14pt;"><strong>4. Controls information exposure during multitasking.</strong></span></p>
<ul>
<li>Blurs or blanks sensitive UI when switching apps.</li>
<li>Integrates with automatic logout/session termination before screen lock.</li>
</ul>
<p>&nbsp;</p>
<p><span style="font-size: 18pt;"><strong><span style="color: #e03e2d;">Applications Results</span></strong></span></p>
<p>After applying LIAPP and LISS to public agency apps, the following benefits were achieved in terms of user protection and operational stability:</p>
<ul>
<li>Complete blocking of overlay-based attacks</li>
<li>Establishment of a rapid detection and response system for third-party app access</li>
<li>Reduced risk of sensitive information exposure &rarr; Improved security audit items</li>
<li>Reduced user complaints and improved app reputation</li>
</ul>
<p>Particularly satisfying was the thorough strengthening of internal information security without impacting the user experience (UX).</p>
<p>&nbsp;</p>
<p><span style="color: #e03e2d; font-size: 18pt;"><strong>In conclusion</strong></span></p>
<p>Mobile security is no longer an issue limited to financial and gaming apps. Protecting mobile services is becoming essential across all sectors, including public institutions, education, healthcare, and communications.</p>
<p>LIAPP and LISS provide a "preemptive defense system" that even considers invisible security threats. As seen in this example, thoroughly isolating and protecting sensitive information within an app from external apps is the first step toward building digital trust.</p>
<p>&nbsp;</p>
<p>#LIAPP #LISS #LIS #MobileSecurity #AppSecurity #PublicInstitutionApp #PublicAppSecurity #OverlayBlocking #ThirdPartyAppAccessPrevention #ScreenCapturePrevention #ScreenRecordingPrevention #AppForgeryPrevention #HookingPrevention #DebuggingPrevention #SensitiveInformationProtection #PublicInstitutionSecurity #MobileSecuritySolution #AppSecurityEnhancement #PersonalInformationProtection #SecurityCases #SecurityIntroductionCases #MobileServiceSecurity #ClipboardSecurity #UISecurity #AppSecurityPolicy</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/64-tech-Preventing-Information-Exposure</guid>
	<pubDate>2025-11-19 00:58:19</pubDate>
</item>
          <item>
	<title>Preventing Content Capture and Blocking DRM Bypass – Introduction of LIAPP &amp; LISS</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/63-tech-Preventing-Content-Capture</link>
	<description><![CDATA[<p><span style="font-size: 24pt; color: #34495e;"><strong><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20251119003340uHrDncM.png"></strong></span></p>
<p><span style="font-size: 24pt; color: #34495e;"><strong>Preventing Content Capture and Blocking DRM Bypass &ndash; Introduction of LIAPP &amp; LISS</strong></span></p>
<p><br>Hello!</p>
<p>Today, we'd like to share a real-world example of how LIAPP and LISS (screen capture prevention service) were implemented together to safely protect high-definition video content in a mobile environment.</p>
<p>As mobile-based content provision expands across various industries, including OTT, education, film, and broadcasting, the threat of illegal content capture, duplication, and leakage is rapidly increasing. The damage caused by illegal distribution is particularly significant for high-quality videos, making strengthening content security in mobile environments a critical priority.</p>
<p><br><strong><span style="font-size: 18pt; color: #e03e2d;">Why is content protection important?</span></strong></p>
<p>The widespread adoption of mobile streaming services has significantly improved user convenience, but at the same time, security threats, such as the following, are also rapidly increasing.</p>
<p>Real-time recording using a screen recording app</p>
<p>Source extraction using DRM (Digital Rights Management) bypass tools</p>
<p>Memory capture on rooted/jailbroken devices</p>
<p>Unauthorized storage and leaks using third-party recording and hooking apps</p>
<p>These threats not only harm content copyright holders, but can also negatively impact service providers' credibility and partnerships.</p>
<p><br><strong><span style="font-size: 18pt; color: #e03e2d;">Background for the Introduction of LIAPP + LISS</span></strong></p>
<p>Establishing a Two-Track Security System for Mobile Content Protection</p>
<p>Rather than blocking content security in isolation, we have established a systematic protection environment by applying application security (LIAPP) and a screen capture prevention service (LISS).</p>
<p>The combination of these two services creates a robust content security system that protects the entire app chain: app &rarr; playback &rarr; screen.</p>
<p>&nbsp;</p>
<p><strong><span style="font-size: 18pt; color: #e03e2d;">Key Applications</span></strong></p>
<p><strong><span style="font-size: 14pt;">1. Screen Recording Detection and Blocking</span></strong></p>
<ul>
<li>Real-time detection of OS API-based recording and capture operations</li>
<li>Video playback is paused or the screen is blanked when recording begins</li>
<li>Immediately displays a warning message to the user</li>
</ul>
<p><strong><span style="font-size: 14pt;">2. Prevents DRM Bypass Attempts</span></strong></p>
<ul>
<li>Automatically terminates the app when detecting DRM disabling or bypassing attempts</li>
<li>Blocks DRM bypass attempts in rooted and jailbroken environments</li>
<li>Encrypted streaming and playback control through LISS DRM</li>
<li>All security events are linked to server logs</li>
</ul>
<p><span style="font-size: 14pt;"><strong>3. Blocks external capture apps and hooking tools</strong></span></p>
<ul>
<li>Detects mirroring, hooking, and debugging tools</li>
<li>Strongly blocks API hooking and memory access attempts</li>
<li>Ensures security for content output areas</li>
</ul>
<p><strong><span style="font-size: 14pt;">4. App forgery and integrity verification</span></strong></p>
<ul>
<li>Prevents APK tampering and repackaging</li>
<li>Blocks execution if integrity is violated</li>
</ul>
<p><span style="font-size: 14pt;"><strong>5. Enhanced streaming security</strong></span></p>
<ul>
<li>DRM Encrypted streaming</li>
<li>Session-based access control</li>
<li>Customized watermark application</li>
<li>Automatic application of security policies based on playback environment</li>
</ul>
<p>&nbsp;</p>
<p><strong><span style="font-size: 18pt; color: #e03e2d;">Effects after implementation</span></strong></p>
<p>After implementing LIAPP and LISS together, we observed the following benefits:</p>
<ul>
<li>A significant reduction in piracy and unauthorized recording attempts</li>
<li>Increased security evaluation scores for affiliated companies, including video companies and broadcasters</li>
<li>Increased positive mentions of "safe content provision" in user reviews</li>
<li>Smooth passage of DRM compliance and security audits</li>
</ul>
<p>Among other benefits, the fact that both security services operate automatically in the background, with no impact on the content playback UX, was a significant advantage.</p>
<p><br><span style="font-size: 18pt;"><strong><span style="color: #e03e2d;">In conclusion</span></strong></span></p>
<p>Content is a core asset of a service.</p>
<p>Especially in areas directly related to copyright, such as video, broadcasting, and educational content, the strength of mobile security directly impacts service reliability.</p>
<p>The integrated security system of LIAPP and LISS goes beyond simple detection to provide real-time protection against capture, recording, DRM bypass, hooking, and tampering attempts.</p>
<p>If you want to safely deliver high-quality content on mobile platforms, now is the time to strengthen your content security system.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><br>#LIAPP #LISS #LIAPP #ContentSecurity #MobileSecurity #ScreenCapturePrevention #ScreenRecordingBlocking #DRMSecurity #DRMBypassBlocking #OTTSecurity #VideoSecurity #ContentLeakPrevention #StreamingSecurity #HookingPrevention #AppForgeryPrevention #IntegrityVerification #MobileDRM #EducationAppSecurity #BroadcastContentSecurity #MobileContentSecurity #MobileStreamingSecurity #ContentDRM #AntiPiracy #AppSecuritySolution #ContentCapturePrevention #SecurityIntroductionCases</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/63-tech-Preventing-Content-Capture</guid>
	<pubDate>2025-11-19 00:37:31</pubDate>
</item>
          <item>
	<title>Preventing Automated Hunting with Emulator Environment Detection – LIAPP Implementation</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/62-tech-Preventing-Automated</link>
	<description><![CDATA[<p><strong><span style="font-size: 24pt; color: #34495e;"><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20251119003252fhjbgtP.png"></span></strong></p>
<p><strong><span style="font-size: 24pt; color: #34495e;">Preventing Automated Hunting with Emulator Environment Detection &ndash; LIAPP Implementation</span></strong></p>
<p><br>Hello!</p>
<p>Today, I'd like to share a real-world example of implementing LIAPP to block automated hunting and repetitive bots in a mobile game environment.</p>
<p>One of the concerns many development teams face when servicing mobile games is the disruption of game balance caused by abnormal players. A key issue is automated hunting and repetitive macro execution using emulators.</p>
<p><br><strong><span style="font-size: 18pt; color: #e03e2d;">Automated Hunting &amp; Macros: Why Are They a Problem?</span></strong></p>
<p>Recently, many users are using PC-based Android emulators to enjoy mobile games for convenience. However, some users are using macro bots in this environment for automated hunting, repetitive collection, and resource farming, which can lead to the following problems:</p>
<p>- Destruction of fair competition</p>
<p>- Economic system imbalance</p>
<p>- Excessive consumption of server resources</p>
<p>- Increased user attrition</p>
<p>The development team needs security features that continuously detect and address abnormal activity.</p>
<p><br>Background for Introducing LIAPP: Strengthening Emulator Monitoring and Response to Macros and Hacking Tools</p>
<p>Mobile game services are constantly facing various security threats. In particular, attempts to directly disrupt game balance, such as automated macros or memory hacking, can have a significant negative impact on service quality and user experience.</p>
<p>To more systematically detect and respond to these threats, we introduced LIAPP, a mobile security solution.</p>
<p>LIAPP is an all-in-one security service for mobile app protection. It excels at detecting macros and hacking tools while also providing comprehensive monitoring of the emulator environment.</p>
<p>Emulators are particularly important for ensuring user accessibility, so we prioritize their use for threat analysis and monitoring, rather than outright blocking.</p>
<p>&nbsp;</p>
<p><strong><span style="font-size: 18pt; color: #e03e2d;">Key Security Threats</span></strong></p>
<p>- Repetitive Automation Scripts (AutoHotKey, Macros, etc.)</p>
<p>- Memory Modification Tools and Hooking Tools</p>
<p>- Modification Attempts Using Rooting and Debugging</p>
<p>- Emulator-Based Operating Environments</p>
<p>- BlueStacks, Nox, LDPlayer, etc.</p>
<p>&nbsp;</p>
<p><strong><span style="font-size: 18pt; color: #e03e2d;">LIAPP Application Methods</span></strong></p>
<p><span style="font-size: 14pt;"><strong>1. Emulator Environment Monitoring</strong></span></p>
<p>- Analysis of various emulators (BlueStacks, Nox, MEmu, etc.)</p>
<p>- Environment Analysis Based on Virtualization, Device Properties, Device ID, etc.</p>
<p>- Enhanced Monitoring Functions for Malicious Pattern Detection and User Group Analysis</p>
<p>- Response with Warning Messages or Restrictions if Necessary</p>
<p><br><strong><span style="font-size: 14pt;">2. Detection of Automation Tools and Macros</span></strong></p>
<p>- Analysis of Touch Input Patterns (Repeated Coordinates, Same-Spacing Input) etc.)</p>
<p>- Precisely identifies automated script behavior</p>
<p>- Various responses available upon detection, including warnings, execution restrictions, and server log integration</p>
<p><br><span style="font-size: 14pt;"><strong>3. Blocking Hacking and Modification Attempts</strong></span></p>
<p>- Detects and blocks memory manipulation tools</p>
<p>- Blocks hooking/debugging attempts</p>
<p>- Restricts execution on rooted devices</p>
<p>- Provides security logs that can be linked to server sanction systems</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><strong><span style="font-size: 18pt; color: #e03e2d;">Application Effects</span></strong></p>
<p>After implementing LIAPP, the percentage of in-game auto-hunting and macro players significantly decreased, while game satisfaction and retention for legitimate users simultaneously improved.</p>
<p>- Reduced operational burden</p>
<p>- Increased detection rate of cheating</p>
<p>- Stabilized game economy</p>
<p>- Increased positive feedback from the community</p>
<p>Above all, we were extremely satisfied with the fact that the implementation of the security solution did not impact game performance or UX at all.</p>
<p>&nbsp;</p>
<p><strong><span style="font-size: 18pt; color: #e03e2d;">In conclusion</span></strong></p>
<p>Maintaining a fair competitive environment is paramount in mobile game operations. Failure to prevent automated play in emulator environments could destabilize the entire gaming ecosystem.</p>
<p>LIAPP goes beyond simple detection to support execution control, environment monitoring, and security log provision, making it a highly effective security partner for mobile game operators.</p>
<p>We will continue to invest in security to create a safer and fairer gaming environment.</p>
<p>When it comes to game security, prevention is the best approach.</p>
<p><br>#LIAPP #LIAPP #MobileSecurity #GameSecurity #MobileGameSecurity #EmulatorDetection #EmulatorBlocking #MacroBlocking #AutomaticHuntingPrevention #BotBlocking #MacroBlocking #MemoryHackingBlocking #GameHackingBlocking #MobileHacking #AppSecurity #GameSecuritySolution #GameOperation #GameDevelopment #CheatPrevention #SecuritySolution #AppSecuritySolution #Semi-AutomatedSecurity #MaintainGameBalance #SecurityCase #SecurityIntroductionCase</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/62-tech-Preventing-Automated</guid>
	<pubDate>2025-11-19 00:33:08</pubDate>
</item>
          <item>
	<title>[Event] 12th Anniversary Appreciation Event</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/63-12th-event</link>
	<description><![CDATA[<!-- 1) 썸네일: 본문에서는 숨김 -->
<p style="display: none; margin: 0;"><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250915035240tRJl5cN.png" alt="Mobile App Security Solution LIAPP 12th Anniversary Event - Free Premium Product Trial"></p>
<!-- 2) 본문 이미지 (650px 고정) + 이미지맵 연결 -->
<p style="margin: 0;"><img style="display: block; margin: 0 auto; border: 0;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20251023041447UYNer3b.png" alt="LIAPP 12th Anniversary Event - Experience Free Premium Security Service" usemap="#imgmap202510231308" width="650" height="2600"></p>
<!-- 3) 이미지맵: 650px 기준 좌표 (상단/하단 2개 CTA 영역) -->
<p><map id="imgmap202510231308" name="imgmap202510231308"> <!-- 영역 1 (상단 CTA 버튼) --> 
<area alt="Join the Free Trial (Top CTA)" coords="198,1341,178,1357,170,1381,182,1404,196,1416,449,1416,472,1403,480,1382,472,1360,451,1342" shape="poly" href="https://3rwojirsp60.typeform.com/to/QWTrT2kS#email=영어&amp;name=12주년이벤트" target="_blank" rel="noopener">
 <!-- 영역 2 (하단 CTA 버튼) --> 
<area alt="Join the Free Trial (Bottom CTA)" coords="199,2439,177,2449,170,2475,183,2497,203,2508,449,2508,472,2493,480,2470,470,2450,447,2437" shape="poly" href="https://3rwojirsp60.typeform.com/to/QWTrT2kS#email=영어&amp;name=12주년이벤트" target="_blank" rel="noopener">
 </map></p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/63-12th-event</guid>
	<pubDate>2025-09-15 01:23:59</pubDate>
</item>
          <item>
	<title>[Notice] You&#039;re Invited to the BIC 2025 Networking Party, &quot;A Meeting of L-Apps and L-Running All-End&quot;! - Friday, August 15th</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/62-bic-2025-networking-party</link>
	<description><![CDATA[<p><span style="font-size: 18pt;"><strong>[Notice] You're Invited to the BIC 2025 Networking Party, "A Meeting of L-Apps and L-Running All-End"! - Friday, August 15th</strong></span></p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250731004618HjqjN8Q.png"></p>
<p>Hello, game developers!</p>
<p>On Friday, August 15th, 2025, we're inviting LIAPP and L-Running All-End developers to celebrate BIC.<br>We've prepared a networking party 🎉 in Busan to celebrate BIC 2025!</p>
<p>Pre-register by clicking the button below, and we'll prepare your entrance badge in advance.<br>After the event, please come to Haeundae and spend a meaningful time with great people!</p>
<p>Eligibility: Anyone in the game industry! Date: Friday, August 15, 2025, 6:00 PM - 10:30 PM<br>Location: 25cm Skewers &amp; Oden Bar Yukare Haeundae Branch (1-minute walk from Haeundae Station Exit 5)<br>Participation Fee: Free<br>What to Bring: A generous supply of business cards and a storybook<br>Registration: <a href="https://docs.google.com/forms/d/e/1FAIpQLSfQBXP3nK8pRi8I4RywXFwjRgwmbBVPim3r_zCg4D_4hWYD9w/viewform">https://docs.google.com/forms/d/e/1FAIpQLSfQBXP3nK8pRi8I4RywXFwjRgwmbBVPim3r_zCg4D_4hWYD9w/viewform</a></p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250730233331h2gQksb.png"></p>
<p>Registration: <a href="https://docs.google.com/forms/d/e/1FAIpQLSfQBXP3nK8pRi8I4RywXFwjRgwmbBVPim3r_zCg4D_4hWYD9w/viewform">https://docs.google.com/forms/d/e/1FAIpQLSfQBXP3nK8pRi8I4RywXFwjRgwmbBVPim3r_zCg4D_4hWYD9w/viewform</a></p>
<p><br>On the day We look forward to seeing you at the 25cm Skewers &amp; Odeng Bar Yukare Haeundae branch! Thank you🍢😊</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/62-bic-2025-networking-party</guid>
	<pubDate>2025-07-30 23:31:50</pubDate>
</item>
          <item>
	<title>Protecting Mobile Game Revenues by Blocking Distribution of Cracked APKs, Introduction to LIAPP Application Cases</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/61-tech-Game-Cracked-APK</link>
	<description><![CDATA[<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250723231552JjvPKzH.png"></p>
<h2><span style="font-size: 24pt;">Protecting Mobile Game Revenues by Blocking Distribution of Cracked APKs, Introduction to LIAPP Application Cases</span></h2>
<p>The mobile game market continues to grow every year and generates huge revenues worldwide. However, there is a fatal problem that hinders this growth: the illegal distribution of cracked APKs. Many game developers are seriously suffering from in-app payment revenues due to this, and it is even threatening the survival of the game.</p>
<p>Today, we would like to share a successful story of protecting game app revenues by focusing on the case of applying &lsquo;LIAPP, a mobile security service&rsquo; to solve this problem.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>What is a cracked APK?</strong></span></h3>
<p>A cracked APK refers to an app that was decompiled by a hacker and repackaged or redistributed with security disabled.</p>
<p>Most of these apps are illegally distributed for the following purposes:</p>
<p style="padding-left: 40px;">&bull; Bypassing in-app payments<br>&bull; Removing advertisements<br>&bull; Providing unlimited in-game resources (e.g. gold, diamonds, items, etc.)<br>&bull; Inserting malicious code</p>
<p>Ultimately, normal users suffer losses and developers lose revenue.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Real losses due to bypassing in-app payments</strong></span></h3>
<p>The most important revenue model for mobile games is &lsquo;in-app payments (IAP)&rsquo;. Users can purchase desired items while enjoying the game or pay for quick growth. However, users using cracked APKs can enjoy all these benefits without going through the normal payment process.</p>
<p>In fact, a small and medium-sized game company experienced a decrease of more than 30% in total sales in a month after distributing cracked APKs, and faced a situation where normal users even left due to cracked files being indiscriminately shared in the community.</p>
<p>&nbsp;</p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250723231758cc3fyU8.png"></p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Preventing forgery and repackaging with LIAPP</strong></span></h3>
<p>In this situation, the game company introduced &lsquo;LIAPP,&rsquo; a mobile app security service. LIAPP provides real-time forgery detection and repackaging prevention functions, thereby realizing the following security effects.</p>
<p><strong><span style="font-size: 14pt;">Key security features applied</span></strong><br>1. APK forgery detection<br>&nbsp;&bull; Real-time file integrity verification, blocking execution of modified apps</p>
<p>2. Repackaging prevention<br>&nbsp;&bull; Identify abnormal packaging by verifying app signature integrity</p>
<p>3. Debugging prevention and rooting detection<br>&nbsp;&bull; Preemptively blocking hackers from analyzing or manipulating apps</p>
<p>4. App analysis tool detection<br>&nbsp;&bull; Detects and automatically terminates representative hacking tools such as Frida, Xposed, and Lucky Patcher</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Effects after applying security</strong></span></h3>
<p>After strengthening security, game companies experienced noticeable performance improvements.</p>
<p style="padding-left: 40px;">&bull; Blocking illegal users by setting the app to automatically terminate when using cracked APKs<br>&bull; Sharp decrease in sharing within the community as cracked files that were being distributed became useless<br>&bull; Increased payment rate and return visit rate of normal users<br>&bull; Improved reliability by announcing the fact of security enhancement</p>
<p>Above all, it was possible to kill two birds with one stone: sales recovery and user base stabilization.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Game security, join LIAPP!</strong></span></h3>
<p>As much effort was put into game development, it is also very important to safely protect the resulting app. In particular, for mobile games that rely on in-app payments as their main source of revenue, security is not an option but a must.</p>
<p>&lsquo;LIAPP&rsquo; is a global service that provides powerful security features with simple application without complex development knowledge.</p>
<p>I highly recommend that game developers who are concerned about the distribution of cracked APKs take a look at it.<br>Let&rsquo;s protect the game we created together.</p>
<p>&nbsp;</p>
<p>#MobileGame #GameSecurity #LIAPP #CrackAPK #In-AppPaymentProtection #AppSecurity #RepackagingPrevention #MobileSecurity</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/61-tech-Game-Cracked-APK</guid>
	<pubDate>2025-07-23 23:20:18</pubDate>
</item>
          <item>
	<title>Encryption Application for Protecting PHI (Personal Health Information) – Case Study of Introduction of LIAPP</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/60-Personal-Health-Information</link>
	<description><![CDATA[<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/202507140153321QDzOyI.png"></p>
<h2><span style="font-size: 24pt;">Encryption Application for Protecting PHI (Personal Health Information) &ndash; Case Study of Introduction of LIAPP</span></h2>
<p>Today, we will share a case study of introducing &lsquo;mobile security service LIAPP&rsquo; to safely protect &lsquo;sensitive health information (PHI: Protected Health Information)&rsquo; such as &lsquo;medical records, test results, etc.&rsquo;</p>
<p>With the development of mobile healthcare services, we can now check not only hospital reservations but also health checkup results, treatment records, and prescriptions through apps. However, did you know that security threats are also rapidly increasing as such sensitive personal health information is digitized?</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>What is PHI?</strong></span></h3>
<p>PHI is an abbreviation for Protected Health Information, and as the name suggests, it refers to information related to an individual&rsquo;s health.</p>
<p>For example,<br>&nbsp;&bull; Medical records<br>&nbsp;&bull; Health checkup results<br>&nbsp;&bull; Disease and prescription history<br>&nbsp;&bull; Medical imaging data<br>&nbsp;&bull; Insurance claim information</p>
<p>All of these are PHI. Since this information is directly connected to an individual&rsquo;s privacy, if it is leaked, it can lead to serious damage.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt;"><strong><span style="color: #e03e2d;">How safe is PHI in the mobile environment?</span></strong></span></h3>
<p>Many healthcare apps provide in-mobile storage for the convenience of users, but what if data is stored on the device without encryption? There is a possibility that hackers can access it through malicious apps or that information can be leaked through rooted/jailbroken devices. Therefore, we must encrypt and protect PHI data within the app.</p>
<p>&nbsp;</p>
<p><span style="font-size: 18pt;"><strong><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250714015350zkUpjMz.png"></strong></span></p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Case of applying PHI encryption using LIAPP</strong></span></h3>
<p>Our team recently built a system to safely protect users&rsquo; PHI data by applying &lsquo;LIAPP&rsquo; to a mobile healthcare app.<br>LIAPP is an all-in-one mobile security solution that can strengthen in-app security, and is specialized in protecting apps from various threats.</p>
<p><span style="font-size: 14pt;"><strong>Background of introduction</strong></span><br>&nbsp;&bull; It was difficult to respond to the risk of data theft within the app with only existing security features.<br>&nbsp;&bull; In particular, since medical records, test results, and image data had to be stored within the app for a certain period of time, storage through encryption was essential.<br>&nbsp;&bull; At the same time, the user experience had to be maintained, so a security solution without performance degradation was needed.</p>
<p><span style="font-size: 12pt;"><strong>LIAPP's main application points</strong></span><br><strong>&nbsp;1. Encryption and obfuscation of important source code</strong><br>&nbsp; &nbsp; &rarr; We prevented the analysis of the important code of the PHI app through obfuscation and encryption.<br>&nbsp; &nbsp; &nbsp; &nbsp; In other words, important data is encrypted in the app, and LIAPP protects the encryption logic from being analyzed.</p>
<p><strong>&nbsp;2. Prevention of app forgery and tampering</strong><br>&nbsp; &nbsp; &rarr; LIAPP detects forgery/tampering in real time while the app is running, and blocks execution in abnormal environments.</p>
<p><strong>&nbsp;3. Detection of rooting and execution restriction</strong><br>&nbsp; &nbsp; &rarr; We minimized the risk by blocking app execution on rooted devices or restricting access to specific sensitive information.</p>
<p><strong>&nbsp;4. Prevention of debugging and hooking</strong><br>&nbsp; &nbsp; &rarr; We minimized the possibility of PHI theft by blocking attack attempts using developer tools in advance.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>What were the effects after applying LIAPP?</strong></span></h3>
<p>&bull; Users' trust in protecting their personal health information increased.<br>&bull; We also received excellent evaluations in security inspections and audits.<br>&bull; The internal audit system was also improved to a structure that detects security issues in advance. What I was most satisfied with was that strong security was implemented without affecting the performance or UX of the app at all.</p>
<p>Now that digital healthcare has become a daily routine, PHI security is not an option but a must.</p>
<p>Especially in an era where sensitive medical information is distributed in real time through mobile devices, a comprehensive protection strategy that combines encryption and app security is important. We will continue to invest heavily in security so that users can use our services with confidence.</p>
<p><br>Mobile security, you can no longer put it off. Take the first step toward PHI protection with LIAPP. Thank you!</p>
<p>&nbsp;</p>
<p>#PHIProtection #PersonalHealthInformationSecurity #MobileHealthcareSecurity #LIAPPIntroductionCase #AppSecuritySolution #MedicalInformationEncryption #MobileAppSecurity #HealthcareApp #MedicalAppDevelopment #DataEncryption #RootingAnti-ForgeryAnti-MobileSecurity #PersonalInformationProtection #SecurityTechnology #HealthcareIT #DigitalHealth #AppSecurity #HealthcareApp #LIAPP</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/60-Personal-Health-Information</guid>
	<pubDate>2025-07-14 01:55:55</pubDate>
</item>
          <item>
	<title>“Infinite HP and Gold? Is that possible?” Case of blocking game variable manipulation with LIAPP revealed</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/59-HP-Gold-Score-Experience</link>
	<description><![CDATA[<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250714014717v82WElI.png"></p>
<h2><span style="font-size: 24pt;">&ldquo;Infinite HP and Gold? Is that possible?&rdquo; Case of blocking game variable manipulation with LIAPP revealed</span></h2>
<p>When developing and operating mobile games, one thing becomes clear. Hackers always try to manipulate the game in new ways.<br>Among them, one of the most frequently attempted hacking methods is in-game variable manipulation. This is a method of destroying the game balance by arbitrarily changing important figures such as HP, gold, score, experience, and cooldown.</p>
<p>Most of this manipulation is done with tools such as Game Guardian and Cheat Engine. However, now, there is a way to detect and block such attempts in real time. It is through the mobile app security service &lsquo;LIAPP&rsquo;.</p>
<p>Today, we will introduce a case.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>How do game variables manipulated with hacking tools work?</strong></span></h3>
<p>Tools that manipulate the game&rsquo;s internal data work in the following way.</p>
<p><strong><span style="font-size: 14pt;">How to use Game Guardian / Cheat Engine:</span></strong><br>&nbsp;1. Scan variables (e.g. HP 100) that the game app has loaded into memory<br>&nbsp;2. Find the address and manipulate it in real time (e.g. HP &rarr; 999999)<br>&nbsp;3. Change variable values to enable abnormal play such as infinite health, infinite gold, etc.<br>&nbsp;4. Repackage the app or perform automatic repetition through a script</p>
<p>This method is easy for anyone on a rooted device,<br>and can be fatally damaging, especially in single-player games or games with loose synchronization with the server.</p>
<p>&nbsp;</p>
<p><span style="font-size: 18pt;"><strong><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250714014733LnkHFbP.png"></strong></span></p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>LIAPP's real-time memory protection function</strong></span></h3>
<p>LIAPP is a security solution that goes beyond the level of general app protection and can detect and block memory modification that occurs during app execution in real time.</p>
<p>&nbsp;&bull; Memory integrity verification: Detects changes in the address and value of important variables while the app is running<br>&nbsp;&bull; Real-time hooking detection: Immediately blocks external tools when they access memory or attempt to change values<br>&nbsp;&bull; Suspicious process detection: Forces the app to terminate or block it when running GameGuardian, Cheat Engine, etc.<br>&nbsp;&bull; Automatic recovery: Initializes the app status or terminates a specific session when an abnormality occurs<br>&nbsp;&bull; Blocks rooted/jailbroken devices: Processes environments with a high possibility of memory manipulation as unexecutable</p>
<p>&nbsp;</p>
<h3><strong><span style="font-size: 18pt; color: #e03e2d;">Actual application case: Mobile RPG game that blocks variable manipulation in real time</span></strong></h3>
<p>Idle RPG games that are popular in Korea were structured around a numerical growth system such as gold, experience points, and item drop rates.<br>However, immediately after the release, a post saying, "Easily manipulate gold with Game Guardian" spread through the user community, and the gap between normal users and hacking users rapidly widened.</p>
<p><strong><span style="font-size: 14pt;">Key Issues</span></strong><br>&nbsp;&bull; Infinite gold manipulation &rarr; sharp drop in value of paid items<br>&nbsp;&bull; Emergence of PvP imbalanced users due to HP manipulation<br>&nbsp;&bull; Infinite skill cooldown manipulation &rarr; Balance collapse<br>&nbsp;&bull; Community complaints skyrocket and many refund requests</p>
<p><span style="font-size: 14pt;"><strong>Response: Introduction of LIAPP and application of memory protection</strong></span><br>&nbsp;&bull; Automatic termination of app when GameGuardian is executed<br>&nbsp;&bull; Application of memory integrity verification for important variables (HP, gold, experience points)<br>&nbsp;&bull; App log recording and automatic reporting in case of hooking attempt<br>&nbsp;&bull; Activation of rooting detection and security warning message output function</p>
<p><strong><span style="font-size: 14pt;">Results</span></strong><br>&nbsp;&bull; Blocking of over 95% of manipulated users<br>&nbsp;&bull; Recovery of app market review rating (★2.9 &rarr; ★4.4)<br>&nbsp;&bull; Increase in positive feedback such as &ldquo;hacking doesn&rsquo;t work&rdquo; and &ldquo;security is great&rdquo; on the official cafe<br>&nbsp;&bull; Recovery of over 30% of paid item sales</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>The vitality of a game starts with blocking variable manipulation</strong></span></h3>
<p>It is difficult to make a game completely free from hacking, but the fairness and profitability of the game can be noticeably improved simply by protecting key figures from being manipulated. LIAPP's real-time memory protection technology goes beyond simply preventing hacking, and is the core of security that protects the game's lifespan, user trust, and sales stability.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Game security, can't be delayed any longer</strong></span></h3>
<p>"I'm playing a game alone, so can I use hacks?" That's not true. Hacking is not something you do alone, but an act that destroys a fair ecosystem.<br>In an era where a single hacker's manipulation script spreads to thousands of people, the answer is now not post-response, but preemptive blocking.</p>
<p>LIAPP blocks hackers before they even touch your memory. With real-time detection, tampering blocking, and powerful hooking prevention, it will be the weapon that protects your game the safest.<br>LIAPP's fair game world, start now.</p>
<p>&nbsp;</p>
<p>#LIAPP #LIAPP #Mobile game security #Memory tampering prevention #GameGuardian blocking #CheatEngine blocking #Game hack prevention #Real-time security #App integrity #Variable manipulation blocking #RPG security case #Game security #App security solution</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/59-HP-Gold-Score-Experience</guid>
	<pubDate>2025-07-14 01:49:56</pubDate>
</item>
          <item>
	<title>&quot;Is this coupon real?&quot; Introducing a case study on preventing payment forgery and reward abuse with LIAPP</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/58-tech-Payment-Reward</link>
	<description><![CDATA[<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250714014001bShVkGQ.png"></p>
<h2><span style="font-size: 24pt;">"Is this coupon real?" Introducing a case study on preventing payment forgery and reward abuse with LIAPP</span></h2>
<p>&nbsp;</p>
<p>In the digital transformation era, O2O (Online to Offline) services have become deeply embedded in our daily lives. From delivery apps, taxi calls, accommodation reservations, to shared mobility&mdash;most O2O platforms offer benefits such as discount coupons, accumulated points, and promotional rewards to attract users.&nbsp;However, this is where security vulnerabilities arise. There are endless cases of some users or hackers modifying apps or manipulating rewards to infinitely repeat discounts or forge points.</p>
<p>To prevent such financial losses and system abuse, there is a solution that many O2O companies have chosen. It is the 'mobile security service LIAPP'.</p>
<p>Today, we will introduce in detail a case study where payment forgery and reward abuse were actually prevented through LIAPP.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Common reward abuse methods in O2O services</strong></span></h3>
<p>The method of exploiting O2O apps is not technically difficult. Anyone with a publicly available rooting tool or memory manipulation app can do the following:<br>&nbsp;&bull; Use discount coupons repeatedly<br>&nbsp;&bull; Unlimited payments through point manipulation<br>&nbsp;&bull; Attempt to cancel payments by blocking the network after app payment<br>&nbsp;&bull; Repeatedly execute reward payment routines to create unlimited points<br>&nbsp;&bull; Disable specific event conditions by modifying app code</p>
<p>These actions can cause losses of millions to tens of millions of won for even a single user, destroy fairness between users, and have a major impact on brand reliability.</p>
<p>&nbsp;</p>
<p><span style="font-size: 18pt;"><strong><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250714014008hrTl2tj.png"></strong></span></p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>LIAPP, a powerful security solution for O2O apps</strong></span></h3>
<p>LIAPP is a security solution that can be easily applied within mobile apps,<br>providing various abnormal behavior detection and blocking functions that can occur on the client side.<br>In particular, it has optimized protection functions for reward manipulation, payment forgery, and coupon abuse that frequently occur in O2O services.</p>
<p><strong><span style="font-size: 14pt;">Key security features</span></strong><br>&nbsp;&bull; Memory manipulation detection: Detect attempts to change memory values at runtime<br>&nbsp;&bull; Rooting detection and blocking: Restrict app execution on jailbroken/rooted devices<br>&nbsp;&bull; Debugging and hooking blocking: Prevents analysis in advance using Frida, Xposed, etc.<br>&nbsp;&bull; Integrity check: Checks for app code modification and automatically terminates the app<br>&nbsp;&bull; Network bypass detection: Detects arbitrary blocking or modification of communication with the payment server</p>
<p>&nbsp;</p>
<h3><span style="color: #e03e2d;"><strong><span style="font-size: 18pt;">Actual application case: Prevents coupon/point abuse</span></strong></span></h3>
<p>A domestic mid-sized franchise-based delivery O2O platform has been suffering from coupon abuse and point manipulation issues since its service launch.</p>
<p><strong><span style="font-size: 14pt;">Problem situation</span></strong><br>&nbsp;&bull; New member coupon 5,000 won &rarr; Rooting users repeatedly create new accounts and use coupons infinitely<br>&nbsp;&bull; Referral reward system &rarr; arbitrarily changes the referral number by manipulating the app<br>&nbsp;&bull; A specific hacker manipulated points from 0 to 10,000 to complete payment</p>
<p>As a result, reward financial losses amounting to tens of millions of won per month occurred, and internal audits were unable to track all related activities.</p>
<p><span style="font-size: 14pt;"><strong>Countermeasures: Introduction of LIAPP</strong></span><br>&nbsp;&bull; Implemented rooting detection and execution blocking functions in apps<br>&nbsp;&bull; Strengthened memory integrity check when granting/using points<br>&nbsp;&bull; Encrypted and prevented hooking of referral system access functions<br>&nbsp;&bull; Automatically terminated app after debugging detection when applying coupons</p>
<p><strong><span style="font-size: 14pt;">As a result</span></strong><br>&nbsp;&bull; Blocked more than 90% of malicious rooting users<br>&nbsp;&bull; Reduced number of cases of point manipulation to 0<br>&nbsp;&bull; Sharp decrease in inquiries about coupons and objections through customer service center<br>&nbsp;&bull; Stabilized operation of reward system</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Will there be no inconvenience for users? Business can continue only when security is maintained</strong></span></h3>
<p>Many security systems have difficulty maintaining a balance between enhanced security and user convenience.<br>However, LIAPP is designed to apply real-time security with minimal performance load so that general users can use the app without any inconvenience.<br>In addition, even in cases where abnormal behavior is determined, guided security responses are possible through warning messages or execution restrictions within the app.</p>
<p>As the number of users of O2O services increases, security threats also increase exponentially. Even if just one reward exploitation routine is discovered, malicious users who replicate it will increase in an instant. Now, a security strategy that focuses on preemptive blocking, not post-response, is essential. LIAPP is an advanced mobile security solution that detects real-time threats and blocks malicious behavior before it even occurs.</p>
<p>Are you still putting the security of your O2O app on the back burner? Now, completely block payment forgery and reward abuse. LIAPP protects your business profits.</p>
<p>&nbsp;</p>
<p>#LIAPP #LIAPP #MobileSecurity #O2OSecurity #CouponAbusivePrevention #PointManipulationPrevention #PaymentForgery #SecuritySolution #RewardSystemSecurity #AppSecurity #EventAbusivePrevention #FranchiseAppSecurity #MobileRewardSecurity #HackingPrevention</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/58-tech-Payment-Reward</guid>
	<pubDate>2025-07-14 01:42:00</pubDate>
</item>
          <item>
	<title>Mobile game hacking, preventing it from even starting! Introducing a case of blocking debugging tools with LIAPP</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/57-tech-game-Hacking-tool</link>
	<description><![CDATA[<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/202507140132596V3fTKO.png"></p>
<h2><span style="font-size: 24pt;">Mobile game hacking, preventing it from even starting! Introducing a case of blocking debugging tools with LIAPP</span></h2>
<p>If you are a mobile game developer, you may have heard of debugging tools such as Frida, Xposed, and Magisk. And you probably know that these tools are the starting point of game hacking.</p>
<p>Attempts to analyze game code, manipulate resources, or create illegal tools (so-called 'hack tools') using these tools are becoming increasingly sophisticated.<span style="font-size: 12pt;"> However, now, these attempts can be blocked before they even start. That is, through the 'mobile app security service LIAPP'.</span></p>
<p>Today, we will introduce a case of actually applying debugging tool detection such as Frida and Xposed to a mobile game app and preventing the creation of hacking tools in advance.</p>
<p>&nbsp;</p>
<h3><span style="color: #e03e2d;"><strong><span style="font-size: 18pt;">Where does game hacking start?</span></strong></span></h3>
<p>Most hack tool productions for mobile games follow the following flow:<br>&nbsp;1. Hooking apps using Frida or Xposed Framework<br>&nbsp;2. Monitoring and manipulating function calls in real time<br>&nbsp;3. Tracking and manipulating game internal variables<br>&nbsp;4. Automating with cheat apps or hack tools</p>
<p>In other words, hack tool production is impossible without prior analysis using debugging tools.</p>
<p>So what can you do?&nbsp;If you detect and block debugging tools themselves so that hackers cannot analyze them at all, you can completely block the first gateway to game security.</p>
<p>&nbsp;</p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250714013320Mh4ftPS.png"></p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>LIAPP's debugging tool detection function</strong></span></h3>
<p>'LIAPP' is a mobile app security solution introduced by numerous domestic and foreign game companies, and is designed to detect and block various security threats in real time when running apps.<br>One of its core functions is the debugging tool detection and blocking function.</p>
<p><strong>Representative tools that LIAPP can detect and block:</strong><br>&nbsp;&bull; Frida<br>&nbsp;&bull; Xposed / LSPosed<br>&nbsp;&bull; Magisk and Magisk modules<br>&nbsp;&bull; Attempts to link with reverse tools such as Jadx and JD-GUI<br>&nbsp;&bull; Activation of ADB debugging session<br>&nbsp;&bull; All runtime debugging/hooking tools</p>
<p><strong>Blocking method:</strong><br>&nbsp;&bull; Immediately blocking app execution on devices where the tool is installed<br>&nbsp;&bull; Automatically terminates when abnormal processes or libraries are detected<br>&nbsp;&bull; Memory protection and real-time hooking defense<br>&nbsp;&bull; Warning message output or forced termination of app when entering app debugging mode</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Practical application case: Preventing hacking in advance by blocking debugging tools</strong></span></h3>
<p>A famous domestic strategy RPG game company detected abnormal behaviors such as automatic battle, infinite goods, and cooldown removal through user analysis from the beginning of its launch, and confirmed that most of them were caused by Frida-based hacking tools.</p>
<p>To solve this, we applied LIAPP's debugging tool blocking function.<br>Application items:<br>&nbsp;&bull; Force-terminate the app immediately when Frida and Xposed are detected<br>&nbsp;&bull; Automatically block ADB debugging and rooting status<br>&nbsp;&bull; Real-time scan for tool installation when running the app</p>
<p>Results:<br>&nbsp;&bull; A sharp decrease in the number of automatic hunting bot users in the game<br>&nbsp;&bull; Reactions such as "hacking blocked" and "Xposed does not work" in Google Play reviews<br>&nbsp;&bull; Many reports of failed hacking of the game in the illegal tool production community</p>
<p>In other words, it was a successful security application case that prevented even attempts at game hacking.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>If security is weak, the game's lifespan is shortened</strong></span></h3>
<p>Mobile games are not just entertainment, but also a digital content business that affects sales, brand, and user community.</p>
<p>However, the moment hackers are allowed to analyze them, the following risks may arise:<br>&nbsp;&bull; Ineffectiveness of inducement items &rarr; Sales decrease<br>&nbsp;&bull; Collapse of fairness between hacking users and general users &rarr; Increase in defection<br>&nbsp;&bull; Loss of community trust &rarr; Damage to the game brand</p>
<p>&nbsp;</p>
<h3><strong><span style="font-size: 18pt; color: #e03e2d;">Therefore, security is not an option, but an essential element that must be prepared before launch.</span></strong></h3>
<p>Just by blocking the debugging tool analysis that is the beginning of game hacking, you can block numerous security threats in advance.<br>The debugging tool detection function of &lsquo;LIAPP&rsquo; blocks hackers from entering the game itself, protecting the game&rsquo;s fairness, sales stability, and brand image at the same time.</p>
<p>The success or failure of a game depends on security. Protect your game with LIAPP right now.</p>
<p>&nbsp;</p>
<p>#LIAPP #LIAPP #MobileSecurity #DebuggingBlocking #FridaDetection #XposedBlocking #GameCheatPrevention #MobileGameSecurity #AppSecurity #ReverseEngineeringBlocking #GameSecurityCases #HackToolBlocking</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/57-tech-game-Hacking-tool</guid>
	<pubDate>2025-07-14 01:35:48</pubDate>
</item>
          <item>
	<title>Application of LIAPP, a mobile app security service that prevents financial fraud through app forgery and malware blocking</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/56-tech-App-illegal-remittance</link>
	<description><![CDATA[<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250708055707PgXUau4.png"></p>
<h2><span style="font-size: 24pt;">Application of LIAPP, a mobile app security service that prevents financial fraud through app forgery and malware blocking</span></h2>
<p>These days, we live in an era of mobile finance where we can transfer money, get loans, and invest with just a smartphone without going to the bank. The development of these fintech services has made finance easier and faster, but at the same time, it is not safe at all in that it has become a major attack target for hackers.&nbsp;In particular, in recent years, cases of illegal remittances or personal information theft attempts on user terminals through app forgery, repackaging, and malware insertion have been rapidly increasing.</p>
<p>In this post, we will examine the importance of mobile security by focusing on a case where a fintech app introduced a mobile app security service called &lsquo;LIAPP&rsquo; to block actual security threats and maintain service trust.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Actual case: Illegal remittance attempt through forged app</strong></span></h3>
<p>Fintech company A was a startup that was rapidly expanding its user base by providing functions such as easy remittance between users, analysis of expenditure history, and integrated management of linked accounts. It was especially well-received by the younger generation for its intuitive UX/UI and convenient authentication system.</p>
<p>One day, a suspicious report came into the customer center. The user claimed that an unknown remittance history had occurred in his account. The company investigated the internal security log and discovered that the transaction did not go through the normal app route.&nbsp;Soon after, the security team discovered that the APK file was being distributed in a falsified form. The hacker had hijacked the original app, inserted malicious code into it, and repackaged it to create a fake app. This app had the same UI as the original app, but it was stealing user information in the background and sending remittance commands to a random server.</p>
<p>This incident was a warning to fintech startups that a single security vulnerability could destroy their entire credibility.</p>
<p>&nbsp;</p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250708055956Oa8sYp4.png"></p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Introducing LIAPP: Real-time forgery detection and automatic blocking</strong></span></h3>
<p>To solve the problem, the company chose &lsquo;LIAPP, a mobile app security service.&rsquo;<br>LIAPP is not a simple security SDK, but rather a cloud-based integrated security platform. It detects and blocks various threats that may occur within the app in real time from the time the app is launched until the user terminates the service.</p>
<p>Main security features of applied LIAPP:<br><strong>1) Detection and blocking of forged APK</strong><br>&nbsp; &nbsp;&bull; Immediately stops execution if the app file is different from the original<br>&nbsp; &nbsp;&bull; Identify code or malicious library inserted by hackers and block app execution</p>
<p><strong>2) Detection of repackaging (resigning)</strong><br>&nbsp; &nbsp;&bull; Classifies suspicious apps due to repackaging and collects logs<br>&nbsp; &nbsp;&bull; Blocks execution of suspicious apps due to repackaging</p>
<p><strong>3) Detection and blocking of rooting environment</strong><br>&nbsp; &nbsp;&bull; Restricts app execution on rooted devices<br>&nbsp; &nbsp;&bull; Prevents malicious behavior through privilege escalation</p>
<p><strong>4) Blocks debugging and hooking attempts</strong><br>&nbsp; &nbsp;&bull; Blocks hackers from analyzing or manipulating the inside of the app<br>&nbsp; &nbsp;&bull; Real-time detection of proxy tools, memory modification, etc.</p>
<p><strong>5) Real-time log collection and analysis of security events</strong><br>&nbsp; &nbsp;&bull; Status of malicious behavior detection can be checked on the administrator page<br>&nbsp; &nbsp;&bull; Pattern analysis by IP/terminal for suspicious events</p>
<p>After applying LIAPP, distributed forged apps were blocked immediately upon execution, and existing user apps were also automatically updated with security updates. As a result, illegal remittance attempts through malicious apps were completely stopped, and measures were taken to prevent user damage from spreading.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>App security is not an option, but a &lsquo;necessary strategy&rsquo;</strong></span></h3>
<p>Many startups focus on developing features and acquiring users, while security is often put on the back burner. However, in financial services, **security is a &lsquo;basic premise&rsquo; that is more important than the features themselves**.</p>
<p>This case was not a simple hacking attempt, but a serious accident that undermined trust. Fortunately, thanks to a quick response and a strong security solution, the company was able to restore trust, and it is said that customers&rsquo; positive evaluations of security enhancements have increased after this incident.</p>
<p><strong>&ldquo;Security is not something inconvenient, but another name for trust.&rdquo;</strong> This fintech app case proves this saying.<br>In an era where tens of millions of won worth of assets are transferred through a single app, hacking can occur in just a few seconds, but it can take years to rebuild trust.<br>Is the app you are currently operating safe? The answer starts with introducing a strong and reliable mobile security solution.</p>
<p>&nbsp;</p>
<p>#MobileSecurity #LIAPP #AppForgeryAntivirus #MalwareBlocking #RepackagingAntivirus #FintechSecurity #AppSecurityCases #RootingDetection #MobileAppSecurity #SecuritySolution #ITSecurity #FinancialSecurity #HackingAntivirus #EssentialMobileSecurity #StartupSecurity #LIAPP #LockinCompany</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/56-tech-App-illegal-remittance</guid>
	<pubDate>2025-07-08 06:01:46</pubDate>
</item>
          <item>
	<title>No more unauthorized leaks of game premium content!</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/55-tech-Game-Premium-Content</link>
	<description><![CDATA[<p><span style="font-size: 18pt;"><strong><img src="https://djez7e2nzzqm3.cloudfront.net/guide/202507080534044E9Us6q.png"></strong></span></p>
<h2><span style="font-size: 24pt;">No more unauthorized leaks of game premium content!</span></h2>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Introducing a case of blocking screen capture and recording with LISS</strong></span></h3>
<p>When playing a game, premium content such as paid stories, limited illustrations, and strategy information that can only be viewed after payment often appears. From the developer's perspective, such high-quality content is a key element that creates the game's revenue model and brand value.</p>
<p>These days, premium content provided through mobile apps is becoming more diverse and sophisticated. In particular, in game apps, there are many contents that are used as elements to induce users to pay, such as paid stories, high-quality illustrations, and high-quality strategy information. However, cases of unauthorized leaks of such content through screen capture or screen recording are constantly occurring, and developers are increasingly concerned about security.</p>
<p>Today, we will introduce an actual application case of 'mobile app security service LISS' that solved these concerns. This is a case where illegal leaks of premium content were effectively blocked through LISS's screen capture and screen recording blocking functions.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Unauthorized capture and video leak of paid content</strong></span></h3>
<p>The method of leaking paid content is simpler than you think.<br>All you have to do is save the game screen with the smartphone's basic capture function or record the screen using an external app, and share it on SNS, communities, video platforms, etc.</p>
<p>The problem starts here.<br>&nbsp;&bull; Paid story leak: Content can be viewed without paying &rarr; Damage to revenue structure<br>&nbsp;&bull; Illustration leak: Loss of rarity &rarr; Reduced incentive for users to pay<br>&nbsp;&bull; Strategic information leak: Collapse of competition structure &rarr; Damage to game balance<br>&nbsp;&bull; Risk of design theft: Copyright infringement by a third party using captured images or videos</p>
<p>In other words, a simple screenshot or video can destroy the game ecosystem.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>LISS's screen capture/recording prevention function</strong></span></h3>
<p>'LISS' is a powerful app security service developed by Lockin Company, a mobile application security specialist. It blocks security threats to various apps including games in real time and provides various functions to prevent unauthorized content leaks.</p>
<p>Among them, the following two features are particularly noteworthy:<br><strong>1) Screen capture blocking</strong><br>&nbsp; &nbsp;&bull; Disable basic capture functions (Fn+Power, 3-finger capture, etc.)<br>&nbsp; &nbsp;&bull; Block external capture apps (e.g. Screenshot Easy, AZ Screen Recorder, etc.)<br>&nbsp; &nbsp;&bull; Automatically black screen when sensitive content is exposed</p>
<p><strong>2) Screen recording prevention</strong><br>&nbsp; &nbsp;&bull; Automatically terminate or blackout the app when screen recording is detected<br>&nbsp; &nbsp;&bull; Detect Google Play game recording, Discord overlay, and streaming tools<br>&nbsp; &nbsp;&bull; Provide warning messages when users and hackers attempt to record screens</p>
<p>These features are more practical in that they can be set in detail to apply only to sensitive content areas within the game client.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Real-world application case: Introduction of LISS to protect paid content</strong></span></h3>
<p>A famous domestic RPG game developer recently experienced an incident where the paid story and advanced illustrations of its game were leaked in large quantities through a video platform. Some users were consuming the content thinking, &ldquo;I can just watch the video without paying,&rdquo; which directly led to a decrease in sales.</p>
<p>Accordingly, the developer introduced LISS and took the following measures:<br>&nbsp;&bull; Screen capture/recording prevention settings for the story playback section and illustration viewer functions<br>&nbsp;&bull; Automatic forced termination function applied when screen recorder is detected</p>
<p>As a result, the number of leaks decreased sharply, and the community also experienced real security effects with responses such as "Capture is not working" and "Video recording is blocked?"</p>
<p>&nbsp;</p>
<h3><strong><span style="font-size: 18pt; color: #e03e2d;">Isn't it inconvenient for users?</span></strong></h3>
<p>Some users responded by saying, "Why can't I capture the screen?" and "I tried to share it, but it doesn't work." However, this inconvenience is within the acceptable range as it is a device to protect the value of game content and provide the same experience to all users.</p>
<p>About a month after applying the security feature:<br>&nbsp;&bull; The number of leaked images and videos uploaded in major communities decreased by more than 90%<br>&nbsp;&bull; Improved awareness through user feedback: "Content protection feels more thorough", "I trust the game"<br>&nbsp;&bull; Internally, we gained confidence based on security in content marketing strategies and paid product composition</p>
<p>As a result, applying the security feature was more than just 'blocking'. It has become an important means of protecting the value of premium content and increasing brand reliability.<br>Above all, since the capture/recording blocking function is applied only to paid content sections, it has little effect on general play.</p>
<p><span style="font-size: 14pt;"><strong><span style="color: #169179;">Rather, it provides a sense of trust and satisfaction that "only those who have paid properly can enjoy the content."</span></strong></span></p>
<p>Paid content in games is not just graphics or videos. It is the fruit of the efforts and creations of numerous developers, and a promise to users. Protecting such content from unauthorized leaks becomes more complete when technical protection measures are combined with legal protection.</p>
<p>The value of mobile content can be properly protected when security is supported. In particular, app services that aim to monetize premium content require even more thorough preparation.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Why LISS?</strong></span></h3>
<p><span style="font-size: 12pt; color: #000000;">LISS is chosen by many companies for the following reasons:</span><br><span style="font-size: 12pt; color: #000000;">&nbsp;&bull; Provides features specialized for mobile content security, such as screen capture/recording prevention</span><br><span style="font-size: 12pt; color: #000000;">&nbsp;&bull; Real-time monitoring with a cloud-based dashboard</span><br><span style="font-size: 12pt; color: #000000;">&nbsp;&bull; Cross-platform compatibility supporting both Android and iOS</span></p>
<p><span style="font-size: 12pt; color: #000000;">LISS's screen capture and recording blocking features are not simply technical features,</span> but strategic choices that protect the value of premium content. At the same time, it is a realistic solution that helps mobile game companies strengthen content security and protect their brand value.</p>
<p>Check out LISS right now, the security that protects the value of creation.</p>
<p>&nbsp;</p>
<p>#LISS #Reapp #GameSecurity #ScreenCaptureBlocking #RecordingBlocking #PaidContentProtection #MobileGameSecurity #GameStoryLeakPrevention #PremiumContent #GameSecurityCases #AppSecuritySolution #ScreenRecordingPrevention #MobileSecurity #AppSecurity #LISS #Reapp #ScreenCapturePrevention #ScreenRecordingBlocking #ContentProtection #MobileGameSecurity #LeakPrevention #PremiumContentProtection #AppDevelopment #SecuritySolution #GameDevelopment #StorySecurity</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/55-tech-Game-Premium-Content</guid>
	<pubDate>2025-07-08 05:37:15</pubDate>
</item>
          <item>
	<title>Strengthening User Authentication of Electronic Civil Service Apps Mobile App Security LIAPP Application Case</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/54-tech-Electronic-civil-affairs</link>
	<description><![CDATA[<p><span style="font-size: 18pt;"><strong><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250708052541fNi3FtV.png"></strong></span></p>
<h2><span style="font-size: 24pt;">Strengthening User Authentication of Electronic Civil Service Apps Mobile App Security LIAPP Application Case</span></h2>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Electronic Civil Service Apps, Security is Life &ndash; User Authentication Made Stronger with LIAPP</strong></span></h3>
<p>Have you ever used electronic civil service services? Various public agency apps such as Government24, Citizens&rsquo; Archive, and Civil Service24 have now become essential services in the daily lives of citizens. However, since they handle sensitive personal information and administrative information, strong security is vital.&nbsp;Recently, the number of public institutions applying &lsquo;mobile security service LIAPP&rsquo; to strengthen user authentication of these electronic civil service apps is increasing. In particular, the role of LIAPP, which protects the login process through the security keypad, is attracting attention.</p>
<p>Today, we will take a closer look at the application cases and how LIAPP protects our information.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Why is electronic civil service app security important?</strong></span></h3>
<p>Electronic civil service apps go beyond simple information search and provide important administrative services such as issuing resident registration copies, paying taxes, and filing civil service applications. In this process, they have a structure that is easily exposed to security threats such as personal information leaks and authentication forgery.</p>
<p>In particular, the following threats exist due to the nature of smartphone-based app services.<br>&nbsp;&bull; Access from rooted/jailbroken devices<br>&nbsp;&bull; Memory hacking through malicious apps<br>&nbsp;&bull; Information theft through screen capture<br>&nbsp;&bull; Input value theft from the security keypad</p>
<p>To respond to these threats, mobile app security is what is needed.</p>
<p>&nbsp;</p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250708052538muH4cPA.png"></p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>What is LIAPP?</strong></span></h3>
<p>LIAPP is a global mobile security service developed by Lockin Company, a mobile application security specialist. LIAPP is designed to detect security threats in real time when the app is running, protect the app from malicious behavior, and safely process authentication information.<br>The main security features are as follows:<br>&nbsp;&bull; Prevention of app forgery and modification<br>&nbsp;&bull; Detection of rooting/jailbreak<br>&nbsp;&bull; Prevention of memory hacking<br>&nbsp;&bull; Protection of security keypad<br>&nbsp;&bull; Screen capture blocking<br>&nbsp;&bull; Detection and prevention of debugging<br>&nbsp;&bull; Application of real-time security policies</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt;"><strong><span style="color: #e03e2d;">Cases of LIAPP applied to public institutions</span></strong></span></h3>
<p>LIAPP has recently been introduced to electronic civil service apps operated by several central government agencies and local governments. They are especially focusing on LIAPP in the user login screen and the security keypad input section, safely protecting the core section of user authentication.</p>
<p><strong><span style="font-size: 14pt;">Strengthening the login security of the civil complaint app</span><br></strong>A public institution was operating a structure in which a user ID and password were entered using a security keypad when logging into the civil complaint app. However, there was a problem that this input process was vulnerable to screen capture or key input hacking.</p>
<p>Therefore, by applying the security trio LIAPP, LIKEY, and LISS of Lockin Company, the following security effects were achieved:</p>
<p>&nbsp;&bull; Screen capture and screen mirroring blocking<br>&nbsp;&bull; Debugging and reverse engineering detection blocking<br>&nbsp;&bull; App execution blocking on rooted devices</p>
<p>As a result, the possibility of civil complaint information leakage was significantly reduced, and service reliability was significantly increased.</p>
<p>Changes in security felt from the user's perspective<br>Apps with LIAPP, LIKEY, and LISS applied provide a noticeable sense of stability from the user's perspective. Although the security keypad operates slightly differently from the general keypad and screen capture is blocked, which may cause some inconvenience, these are essential protection devices to protect the user's personal information. Above all, users can use the app with confidence, and public institutions are also seeing the effect of greatly reducing the risk of security accidents.</p>
<p><span style="font-size: 18pt; color: #e03e2d;"><strong>How safe is the civil service app you use?</strong></span><br>In the digital age, civil service services can be easily used with smartphones. However, behind convenience, thorough security must be supported.<br>The mobile security service &lsquo;LIAPP&rsquo; is a strong guard that ensures that electronic civil service apps can be used with confidence. We hope that more public institutions will adopt this security technology in the future so that all citizens can experience trustworthy digital administrative services.&nbsp;It is also an important attitude as a digital citizen to pay attention to whether public service apps have enhanced security.</p>
<p>&nbsp;</p>
<p>#Electronic civil service #Security keypad #User authentication #LIAPP #LIAPP #Mobile security #App security #Public app security #Security login #Rooting detection #Screen capture blocking #Electronic government</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/54-tech-Electronic-civil-affairs</guid>
	<pubDate>2025-07-08 05:23:48</pubDate>
</item>
          <item>
	<title>Preventing Mobile Game Cheating by Blocking Rooted Devices Application Case of Mobile App Security LIAPP</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/52-tech-game-app-Rooting-Device</link>
	<description><![CDATA[<p><span style="font-size: 18pt;"><strong><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250708052004eDE9Hex.png"></strong></span></p>
<h2><span style="font-size: 24pt;">Preventing Mobile Game Cheating by Blocking Rooted Devices Application Case of Mobile App Security LIAPP</span></h2>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>A Choice for Fair Gaming</strong></span></h3>
<p>Anyone who has experience developing or operating a mobile game has probably been concerned about the issue of &lsquo;cheating&rsquo; at least once. Cheating that breaks the game balance, gives unfair advantages to other users, and ultimately destroys the trust of the entire game community.</p>
<p>The most representative method among them is system hacking using rooted devices.</p>
<p>Today, we will introduce a real case where we introduced &lsquo;mobile security service LIAPP&rsquo; to solve this problem and applied rooting detection and execution restriction functions to effectively block cheating.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>What is a rooted device? Why is it dangerous?</strong></span></h3>
<p>Rooting generally refers to an act in which a user (or hacker) directly acquires system privileges of the Android operating system (OS) that are restricted by the manufacturer or carrier. Rooting causes the following risks:</p>
<p style="padding-left: 40px;">&bull; Modification of system files and security policy bypass<br>&bull; Free execution of cheating tools or memory hacking apps<br>&bull; Manipulation of internal data of game apps or encryption bypass<br>&bull; Bypassing in-app purchases, creating unlimited resources using hacking tools, etc.</p>
<p>In other words, it is no exaggeration to say that any security device can be breached on a rooted device.</p>
<p>&nbsp;</p>
<h3><strong><span style="font-size: 18pt; color: #e03e2d;">Real-life case: Spread of cheating in a rooted environment</span></strong></h3>
<p>As a result of tracking the logs, commonalities were revealed:</p>
<p style="padding-left: 40px;">&bull; Execution on a rooted device<br>&bull; Use of memory manipulation tools<br>&bull; Forgery of internal scripts and asset data</p>
<p>Ultimately, they were cheating by manipulating game resources in a rooted environment without permission to achieve rapid growth and high rankings, widening the gap with normal users.</p>
<p>&nbsp;</p>
<p><span style="font-size: 18pt;"><strong><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250708052010wxFcW9O.png"></strong></span></p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Successful blocking of cheating by introducing LIAPP</strong></span></h3>
<p>The game company in question recognized the seriousness of the situation and quickly introduced **LIAPP, a mobile app security solution**.<br>LIAPP provides various security features optimized for mobile games, and is particularly strong in rooting detection and execution restriction functions.</p>
<p><strong><span style="font-size: 14pt;">Applied security features</span></strong><br><strong>1) Rooting detection and app execution blocking</strong></p>
<p style="padding-left: 40px;">&bull; Automatically blocks apps when running on rooted devices<br>&bull; Precisely detects rooting traces such as su binary, BusyBox, and Magisk<br>&bull; Detects rooting bypass attempts and completely blocks them</p>
<p><strong>2) Detection of cheating tools and hacking apps</strong></p>
<p style="padding-left: 40px;">&bull; Detects popular cheating tools such as GameGuardian, CheatEngine, and Lucky Patcher<br>&bull; Immediately terminates the app or displays a warning when a hacking tool is detected while the app is running<br>&bull; Records cheating attempt history on the server &rarr; Used as a basis for user sanctions</p>
<p><strong>3) Added user response logic for abnormal environments</strong></p>
<p style="padding-left: 40px;">&bull; Provides users with the reason and induces recovery when rooting is detected<br>&bull; Minimizes backlash with flexible security UX configuration rather than disabling the app</p>
<p>&nbsp;</p>
<p><strong>Developer interview</strong><br>&ldquo;In the past, one cheater could shake up the entire server. Now, after introducing LIAPP, that risk has almost disappeared, and the operation team can focus on its original role.&rdquo;</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Changes after applying security</strong></span></h3>
<p>About a month after applying security, there were the following positive changes:</p>
<p style="padding-left: 40px;">&bull; 100% blocking of cheating attempts based on rooted devices<br>&bull; Increased satisfaction of normal users due to sanctions on hacking users<br>&bull; Recovery of game ratings, increased reliability on Google Play Store<br>&bull; Many favorable comments on &ldquo;securing fairness&rdquo; in the community and SNS</p>
<p>Above all, the biggest achievement was that it laid the foundation for normal users to stay longer without leaving.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Security is the first step toward fairness</strong></span></h3>
<p>In mobile games, &lsquo;fun&rsquo; and &lsquo;competition&rsquo; are inseparable elements. However, if the basis of competition is unfair, the game will never last long. In particular, rooting and cheating are very dangerous elements that can lead to not only loss of sales for a company, but also loss of normal users and damage to the brand image.</p>
<p>LIAPP can be applied quickly without complex development, and it is a smart choice that can build a security ecosystem for the game by combining various security features.</p>
<p>Real security is blocking the entire cheating environment, rather than blocking one cheating user. As in the case introduced today, the fairness and user experience of the game can be greatly improved with just the rooting detection and execution restriction functions. If you are a mobile game operator, take your security to the next level right now with &lsquo;LIAPP&rsquo;.</p>
<p>&nbsp;</p>
<p>#LIAPP #Mobile game security #Rooting detection #Cheating prevention #Game hacking blocking #App security case #Fair game environment #Game operation tips #Security solution #Cheater blocking</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/52-tech-game-app-Rooting-Device</guid>
	<pubDate>2025-07-08 05:20:24</pubDate>
</item>
          <item>
	<title>How did we prevent the online casino token theft incident?</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/52-tech-Online-Casino-token</link>
	<description><![CDATA[<p><strong><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250708050922tLNoQrA.png"></strong></p>
<h2><span style="font-size: 24pt;">How did we prevent the online casino token theft incident?</span></h2>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Case of online casino threat response through LIAPP</strong></span></h3>
<p>Recently, as the online casino industry has grown rapidly, countless users around the world are enjoying games conveniently on their smartphones. However, behind the convenience, there are always security threats directly related to money. In particular, tokens or points that can be converted into cash within the game are the main targets of hackers.</p>
<p>Today, we will introduce a token theft incident that actually occurred in an online casino app and share the specific response process of how we strengthened security by applying the &lsquo;mobile security service LIAPP&rsquo;.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Incident Overview: Token theft and blackmail</strong></span></h3>
<p>A serious security incident occurred in a famous online casino app. Hackers used the app&rsquo;s vulnerable security structure to analyze and manipulate the internal logic, thereby unauthorizedly generating millions of game tokens. These tokens were assets that could be converted into cash within the platform, resulting in damages worth tens of millions of won. After the incident, the hacker sent a threatening message to the operator based on this, which caused the company to suffer a triple whammy of service interruption, legal action, and loss of user trust for a while.</p>
<p>&nbsp;</p>
<h3><span style="color: #e03e2d;"><strong><span style="font-size: 18pt;">Cause of security deficiency</span></strong></span></h3>
<p>At the time, the app had the following security vulnerabilities:</p>
<p style="padding-left: 40px;">&bull; Game logic exposed within the client (easily analyzed when decompiled)<br>&bull; Token processing logic exposed in memory, real-time value manipulation possible<br>&bull; Lack of detection function for forgery/repackaging of the app<br>&bull; App can be run on rooted devices, hacking tool detection insufficient</p>
<p>These weaknesses provided the perfect attack environment for hackers, and were actually exploited by manipulating memory values ​​to create an unlimited number of tokens.</p>
<p>&nbsp;</p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250708050938zCL2ly1.png"></p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Response through application of LIAPP</strong></span></h3>
<p>After the incident, the company quickly took security measures and introduced LIAPP, a specialized mobile app security service. LIAPP performs various security functions in real time on the client side to prevent asset attacks such as token theft.</p>
<p><strong><span style="font-size: 14pt;">Application of key security features</span></strong></p>
<p><strong>1) Forgery prevention and integrity verification</strong></p>
<p style="padding-left: 40px;">&bull; Blocks execution if the app has been tampered with or repackaged<br>&bull; Checks the integrity of the app code to detect externally inserted code<br>&bull; Neutralizes attack attempts such as signature forgery or malicious module injection</p>
<p><strong>2) Real-time memory protection</strong></p>
<p style="padding-left: 40px;">&bull; Protection for values ​​that can be manipulated in real time, such as game tokens<br>&bull; Detection and termination of memory hacking tools (GameGuardian, CheatEngine, etc.)<br>&bull; Blocks hackers' attempts to modify memory with real-time protection for internal variables</p>
<p><strong>3) Rooting and hacking tool detection</strong></p>
<p style="padding-left: 40px;">&bull; Restricts app execution after detecting rooted devices, debugging tools, and reversing tools<br>&bull; Neutralizes attacks by automatically terminating the app in an environment where hacking tools are running</p>
<p><strong>4) Client logic obfuscation and code encryption</strong></p>
<p style="padding-left: 40px;">&bull; Protects core game logic from analysis<br>&bull; Blocks reverse engineering by preventing decompilation</p>
<p>&nbsp;</p>
<h3><strong><span style="font-size: 18pt; color: #e03e2d;">Effects after applying security</span></strong></h3>
<p>After applying security, the casino app experienced the following noticeable changes:</p>
<p style="padding-left: 40px;">&bull; 100% blocking of token manipulation attempts<br>&bull; Obtaining hacking tool detection logs &rarr; Strengthening response<br>&bull; Real-time blocking of app analysis/modification attempts &rarr; Unauthorized users Block<br>&bull; Restoring users' trust and normalizing usage<br>&bull; Securing a favorable foundation for responding to overseas operating regulations and security audits</p>
<p>Above all, it is significant in that the awareness that "asset that can be converted into cash must be protected" has become clear and practical security measures have been prepared to realize this.</p>
<p>Online casino apps are not just games, but digital financial platforms where real assets are traded. Therefore, security is not an 'optional' but a survival condition for business continuation.<br>A single security incident like this case can destroy trust built up over the years. However, if you apply the right security strategy and solution, you can regain trust and be reborn as a stronger service.</p>
<p>LIAPP is a security service that is absolutely necessary in app environments where assets are traded, such as online casinos, games, and fintech.<br>Hackers may be targeting your app at this very moment. Take preventive measures, start now.</p>
<p>&nbsp;</p>
<p>#OnlineCasinoSecurity #LIAPP #TokenTheftPrevention #MobileAppSecurity #ForgeryDetection #MemoryProtection #ReverseEngineeringPrevention #CasinoAppSecurity #MobileAssetProtection #GameSecurity</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/52-tech-Online-Casino-token</guid>
	<pubDate>2025-07-08 05:12:17</pubDate>
</item>
          <item>
	<title>Public bicycle app, is user personal information safe?</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/51-tech-bicvle-app-Personal-information</link>
	<description><![CDATA[<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250708050335vYBCFPU.png"></p>
<h2><span style="font-size: 24pt;">Public bicycle app, is user personal information safe?</span></h2>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Introduction to personal information protection case through LIAPP</strong></span></h3>
<p>These days, public bicycle service is easily available all over the city. Many people use it because anyone can rent a nearby bicycle with a mobile app and move around easily. However, did you know that behind this convenience, there is a security threat of user personal information leakage?</p>
<p>Today, we will introduce a real case where the mobile APP security service LIAPP was introduced to protect personal information of public bicycle apps and storage data encryption and forgery detection security were applied.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Personal information leakage is not someone else's problem</strong></span></h3>
<p>Public bicycle apps collect and process various information in addition to simple rental functions. For example:</p>
<p style="padding-left: 40px;">&bull; User basic information such as name and phone number<br>&bull; Payment method information (card registration, simple payment, etc.)<br>&bull; GPS-based usage location and movement route<br>&bull; Rental/return history and time zone analysis information</p>
<p>Most of this data is processed through in-app storage or communication with servers, and if security is not properly applied, there is a high risk that it can fall into the hands of hackers. In particular, data stored on the terminal requires thorough protection, as the device can be easily accessed by hijacking or rooted devices.</p>
<p>&nbsp;</p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250708050458ebXf9B0.png"></p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Security features applied through LIAPP</strong></span></h3>
<p>The public bicycle operator introduced the mobile app security service LIAPP to better protect users' personal information. LIAPP is a security SDK that can be easily integrated into the app, and can detect and automatically respond to various threats when the app is running.</p>
<p><strong><span style="font-size: 14pt;">1. Code obfuscation, encryption</span></strong></p>
<p>By encrypting all user information stored in the app (e.g. login information, recent rental history, etc.), the following security is achieved:</p>
<p style="padding-left: 40px;">&bull; Blocking access through rooted devices or decompilation tools</p>
<p><strong><span style="font-size: 14pt;">2. Detection of app forgery and integrity</span></strong></p>
<p style="padding-left: 40px;">&bull; Automatically detects and blocks execution when the app is modified or repackaged and malicious code is inserted<br>&bull; Prevents hacker analysis through hacking tools, debugging tools, and rooting detection<br>&bull; Blocks personal information theft through unauthorized malicious versions at the source</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Effects after application</strong></span></h3>
<p>The operating company achieved the following improvements after applying LIAPP security:</p>
<p style="padding-left: 40px;">&bull; 100% detection and blocking of information access attempts using hacking tools<br>&bull; Automatic termination of app execution in rooted devices and abnormal environments<br>&bull; Increased app ratings and usage rates due to improved user trust<br>&bull; Easier response to security certification from public institutions</p>
<p>In particular, it is drawing attention as a case that preemptively took technical protection measures in line with the recent strengthening of the Personal Information Protection Act and the strengthening of security audits by administrative agencies.</p>
<p>&nbsp;</p>
<h3><strong><span style="font-size: 18pt; color: #e03e2d;">Personal information protection is now a necessity, not an option</span></strong></h3>
<p>Security threats to mobile apps are becoming increasingly sophisticated. Especially for apps connected to public services or social infrastructure, security is a task that must come first in order to secure social responsibility and trust.<br>LIAPP is a cloud-based security solution that can be applied quickly without complex development, and is already being used in numerous public institutions, financial institutions, and utility apps.</p>
<p>&nbsp;</p>
<h3><strong><span style="font-size: 18pt;">In conclusion</span></strong></h3>
<p>For services that citizens use on a daily basis, such as public bicycle apps, trust in security is the lifeblood of the service. Isn't providing a safe data environment, beyond providing convenience to users, the key to true digital transformation?</p>
<p>LIAPP will be a strong partner that protects your app from hacking threats and protects user personal information.</p>
<p>&nbsp;</p>
<p>#PublicBicycle #MobileSecurity #LIAPP #AppSecurity #PersonalInformationProtection #DataEncryption #ForgeryDetection #PublicAppSecurity #MobileSecurityCase</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/51-tech-bicvle-app-Personal-information</guid>
	<pubDate>2025-07-08 05:06:07</pubDate>
</item>
          <item>
	<title>Introduction to the application of mobile app security LIAPP for used car price data protection</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/50-tech-car-app-data</link>
	<description><![CDATA[<p style="text-align: center;"><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250708021235kOFgKa4.png"></p>
<h2><span style="font-size: 24pt;">Introduction to the application of mobile app security LIAPP for used car price data protection</span></h2>
<p>As the used car market becomes digitalized, app-based used car price comparison services are growing rapidly. While it provides convenience to consumers and new opportunities to businesses, it also increases the risk of price algorithms or internal data being leaked to the outside.</p>
<p>Today, we will introduce a mobile security application case of a used car platform company that effectively responded to these risks. This company safely protects important data by applying code encryption and SSL Pinning through a mobile security service called **LIAPP**.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Why does used car price data need protection?</strong></span></h3>
<p>The core of a used car app is &lsquo;accurate and reliable price information.&rsquo; In order to create this data, complex algorithms and internal databases that reflect transaction history, region, model year, mileage, and market trends are required.</p>
<p>However, if such core information is included in the app without protection, it is exposed to the following threats:</p>
<p style="padding-left: 40px;">&bull; Reverse engineering of the price algorithm<br>&bull; Interception of API communication and data collection<br>&bull; Mass crawling through unauthorized apps or bots<br>&bull; Unauthorized data collection and imitation of competitors</p>
<p>This can lead to problems such as loss of competitive advantage, collapse of the revenue model, and decrease in trust.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Security application through LIAPP</strong></span></h3>
<p>To respond to these threats, the company introduced a mobile security service called **LIAPP**. LIAPP is a cloud-based service that provides powerful security features with just a simple SDK application.</p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/202507080213021lGeqTq.png"></p>
<p><span style="font-size: 14pt; color: #169179;"><strong>Applied security features</strong></span></p>
<p><strong>1. Code encryption</strong></p>
<p style="padding-left: 40px;">&bull; Encrypts code areas containing core logic and algorithms to prevent decompilation and reverse analysis<br>&bull; Blocks hackers from figuring out the internal structure or replicating the algorithm</p>
<p><strong>2. SSL Pinning</strong></p>
<p style="padding-left: 40px;">&bull; Prevents man-in-the-middle attacks (MITM) by fixing certificates in the communication section with the server<br>&bull; Blocks API eavesdropping and data leakage using proxy tools (Fiddler, Charles, etc.)</p>
<p><strong>3. Rooting and hacking tool detection</strong></p>
<p style="padding-left: 40px;">&bull; Restricts app execution when a rooted device or hacking tool is detected, blocking the possibility of data leakage</p>
<p><strong>4. Repackaging and forgery detection</strong></p>
<p style="padding-left: 40px;">&bull; Detects in real time whether the app has been tampered with or repackaged, and blocks execution</p>
<p><span style="font-size: 14pt; color: #169179;"><strong>Changes after applying security</strong></span><br>After applying security, the used car platform experienced the following noticeable effects:</p>
<p style="padding-left: 40px;">&nbsp;&bull; Reduced attempts to expose internal algorithms<br>&nbsp;&bull; Blocked attempts to call illegal APIs<br>&nbsp;&bull; Automatically detects and responds to attempts to analyze apps<br>&nbsp;&bull; Reduced cases of data imitation in competing services<br>&nbsp;&bull; Increased reliability of the platform</p>
<p>In particular, SSL Pinning was used to collect data from outside With crawling attempts completely neutralized, stable service operation centered on normal users has become possible.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>User experience intact, security stronger</strong></span></h3>
<p>Many people worry that introducing a security solution will affect the user experience. However, LIAPP operates in a way that strengthens backend security without affecting the user UX. Security settings are easily maintained even when the app is updated, and the management burden on developers is not large.</p>
<p>We live in an era where digital assets are the competitiveness of a company. In particular, sensitive data such as used car prices are the core value of a business in themselves. No matter how excellent a service is, it is difficult to maintain its value if security is lax.<br>LIAPP is a service that can further strengthen the security of mobile apps without complex settings, helping you focus on your business without worrying about data leaks.<br>If you are operating a used car app or need to protect internal algorithms and data, consider introducing LIAPP right now.</p>
<p>#UsedCarApp #DataSecurity #LIAPP #SSLpinning #MobileSecurity #CodeEncryption #AppSecurity #PriceAlgorithmProtection #CrawlingBlocking #MobileSecuritySolution</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/50-tech-car-app-data</guid>
	<pubDate>2025-07-08 02:15:12</pubDate>
</item>
          <item>
	<title>How should we protect the core asset of educational apps, ‘dictionary content’?</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/49-tech-educontents-dictionary</link>
	<description><![CDATA[<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250703055317OeCvj56.png"></p>
<h2><span style="font-size: 24pt;">How should we protect the core asset of educational apps, &lsquo;dictionary content&rsquo;?</span></h2>
<p>If you look at the smartphone screens of children these days, the next thing you see the most after games are educational apps. In particular, learning apps based on digital dictionaries that help develop vocabulary in English, Chinese characters, and Korean are widely used by children from toddlers to middle and high school students.</p>
<p>However, there is one major concern for those who create such educational apps. That is, the dictionary content contained in the app, or the **knowledge database (DB)** that has been developed and refined for many years, is being leaked or copied without permission. This is more important because it is a problem that goes beyond simple copyright infringement and is directly related to the survival of a business.&nbsp;So how can we safely protect such important data?</p>
<p>Today, we will discuss one of the answers, **mobile app security service LIAPP**.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Security threats to educational apps seen through real cases</strong></span></h3>
<p>Recently, a domestic education startup company A launched an English vocabulary learning app that it had spent a long time developing. The core of this app was a self-built dictionary DB containing tens of thousands of words and example sentences. It was premium content directly composed by professional teachers and linguists, not using general portals or open APIs.</p>
<p>It was initially successful by word of mouth, but after about 3 months, a strange phenomenon occurred.<br>The inflow from search ads on a portal site decreased sharply, and app reviews started to mention that "similar apps are cheaper."<br>The investigation revealed that the dictionary DB file was extracted from within the app and used in another app. The app in question even slightly changed the UI and used the same examples, pronunciations, and explanations.</p>
<p>Company A was shocked and immediately worked with a security company to supplement the entire app.<br>The solution introduced at that time was **LIAPP**.</p>
<p>&nbsp;</p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250703055339fN8uEnh.png"></p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>How does LIAPP protect educational apps?</strong></span></h3>
<p><span style="font-size: 14pt; color: #169179;"><strong>1. Mobile app forgery prevention</strong></span><br>LIAPP prevents hackers from modifying or repackaging apps at will through app forgery detection and blocking functions.<br>As in the above case, attempts to disassemble and manipulate the app to extract the dictionary DB are mostly detected at this stage and the app itself is blocked from running.<br>LIAPP also provides a function to block execution on rooted devices.<br>This is something that general security apps tend to overlook, but in a rooted environment, apps easily cross the security boundary, increasing the possibility of unauthorized access.</p>
<p><span style="font-size: 14pt;"><strong>2. Source code obfuscation and encryption</strong></span><br>Ordinary app developers create apps in languages ​​such as Java or Kotlin and package them as APK files.<br>However, APKs can be easily reverse-engineered to check internal codes or resources.<br>LIAPP obfuscates the app's source code, making it difficult to read the code, hindering analysis, and encrypts important logic or data to protect actual information from being exposed.<br>For example, Company A's dictionary app included a DB with the structure of 'word ID &rarr; definition &rarr; example sentence' inside the app, and this DB itself was encrypted and stored through LIAPP, making it impossible to interpret the DB itself even if the APK was hacked.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Protecting educational content is no longer a 'choice' but a 'must'</strong></span></h3>
<p>Many educational app developers tend to put security aside as they initially focus on implementing functions.&nbsp;However, as content accumulates and the number of users increases, the content becomes a target.</p>
<p style="padding-left: 40px;">&nbsp;&bull; Self-developed content<br>&nbsp;&bull; Voice and pronunciation data<br>&nbsp;&bull; Native speaker commentary video<br>&nbsp;&bull; Word classification algorithm</p>
<p>All of these are competitive and at the same time, targets of protection.</p>
<p>LIAPP not only provides a technical barrier for security, but also provides an automated service that allows developers to easily protect apps without having to write complex security codes separately. Thanks to this, even educational startups and small and medium-sized businesses can use it without burden.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>The greater value of LIAPP - 'Trust'</strong></span></h3>
<p>The most important thing is that security leads to user trust.<br>When parents choose an educational app for their children, in addition to simple UI or price,<br>they consider "Is this app trustworthy?" and "Is personal information or content safe?" In fact, since implementing LIAPP, Company A&rsquo;s app has obtained a security certification badge from the app store, and has been used as a basis for proving its reliability in partnerships with schools and educational institutions.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Educational apps start with &lsquo;content security&rsquo;</strong></span></h3>
<p>Education in the digital age is a **&lsquo;content war&rsquo;**.<br>As much as creating good content, protecting that content is important.<br>If you are operating a content-centered education service such as a dictionary-based education app, vocabulary enhancement tool, word game, or foreign language learning app,<br>Consider introducing a mobile security solution like LIAPP today.<br>Security is not a cost, but an insurance policy for the survival of content.</p>
<p>#EducationalApp #DictionaryApp #AppSecurity #MobileAppSecurity #AppContentProtection #EducationContentSecurity #LIAPP #LIAPP #AppSecuritySolution #AppObfuscation #AppEncryption #MobileSecurityService #SourceCodeProtection #AppForgeryPrevention #AppDevelopment #MobileAppDevelopment #EduTech #EducationStartup #StartupSecurity #AppDBSecurity #EnglishWordApp #VocabularyLearningApp #EarlyChildhoodEducationApp #ElementaryEducationApp #ChildrenEducationApp #SmartLearning</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/49-tech-educontents-dictionary</guid>
	<pubDate>2025-06-20 06:16:37</pubDate>
</item>
          <item>
	<title>How to prevent data leaks from in-house business apps? The story of Company B that solved the blind spot of employee terminal security with LIAPP</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/48-tech-officeapp-app-security</link>
	<description><![CDATA[<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250702231312hO4QFin.png"></p>
<h2><span style="font-size: 24pt;"><strong>How to prevent data leaks from in-house business apps? The story of Company B that solved the blind spot of employee terminal security with LIAPP</strong></span></h2>
<p>As of 2025, many companies are developing and operating various in-house business apps as they pursue digital transformation.<br>Mobile-based business apps have the advantage of allowing employees to work conveniently anytime and anywhere, but they also have the disadvantage of always being exposed to security threats.<br>In particular, in the BYOD (Bring Your Own Device) environment where employees use in-house apps on their personal smartphones (Personal Devices), the risk of confidential information being leaked to the outside is much higher, and corporate security officers cannot be free from concerns about data leaks.</p>
<p>In this post, we will examine the case of Company B, which actually introduced **mobile app security service LIAPP** to strengthen in-house security, and how it was able to prevent data leaks from business apps.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Are &lsquo;business apps&rsquo; used by employees vulnerable to security?&nbsp;</strong></span></h3>
<p>Company B, an IT service company with about 300 employees, developed and operated an in-house mobile app that could handle customer support, project management, internal reporting, etc.</p>
<p>Through this app, employees were performing the following tasks on a daily basis:</p>
<p style="padding-left: 40px;">&bull; Viewing and writing confidential business documents<br>&bull; Registering project progress<br>&bull; Viewing and entering customer information<br>&bull; Proceeding with the approval process for managers</p>
<p>However, most employees using the app were installing and using the app on their personal smartphones, and the IT security team was concerned about the following security issues:</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Key Security Threat Scenarios</strong></span></h3>
<p><strong><span style="color: #169179;">1. If the device is rooted or a malicious app is installed</span></strong><br>&nbsp; &nbsp;&rarr; Risk of sensitive information being stolen or the app being manipulated</p>
<p><strong><span style="color: #169179;">2. If employees decompile the source code and analyze the internal logic</span></strong><br>&nbsp; &nbsp;&rarr; Possible authentication bypass or exploitation of internal functions</p>
<p><span style="color: #169179;"><strong>3. If the app is modified to manipulate authorization rights or execute functions without authorization</strong></span><br>&nbsp; &nbsp;&rarr; Increased threat to internal business systems</p>
<p><strong><span style="color: #169179;">4. If data stored in the app is extracted in an unencrypted state</span></strong><br>&nbsp; &nbsp;&rarr; Project or customer information is leaked as is</p>
<p>While the IT team was looking for a way to resolve all of these security threats, they reviewed a mobile app security service called **LIAPP**.</p>
<p>&nbsp;</p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250703022331IQmcawH.png"></p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Introducing LIAPP &ndash; Applying &lsquo;corporate-level security&rsquo; even to personal devices</strong></span></h3>
<p>LIAPP is a mobile app security service developed by Lockin Company, and is a solution adopted by various companies and public institutions to strengthen app security.<br>Company B needed the following security features for its in-house app, and LIAPP met all of them.</p>
<p><span style="color: #169179;"><strong>1. Verify whether the app has been tampered with, and block execution if any manipulation is detected</strong></span><br data-start="403" data-end="406">&nbsp; &nbsp;&rarr; Anti-tampering</p>
<p><strong><span style="color: #169179;">2. Protect the app&rsquo;s internal source code from being leaked</span></strong><br data-start="490" data-end="493">&nbsp; &nbsp;&rarr; Source code obfuscation and encryption</p>
<p><strong><span style="color: #169179;">3. Prevent sensitive data from being exposed externally</span></strong><br data-start="597" data-end="600">&nbsp; &nbsp;&rarr; Data encryption</p>
<p><strong><span style="color: #169179;">4. Block rooted devices and hacking tool environments</span></strong><br data-start="679" data-end="682">&nbsp; &nbsp;&rarr; Runtime threat detection</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Business app security level changes</strong></span></h3>
<p>Company B compared and analyzed security tests and user logs before and after applying LIAPP.</p>
<p><span style="font-size: 14pt; color: #169179;"><strong>Before application</strong></span></p>
<p style="padding-left: 40px;">&bull; Part of the source code was exposed during the decompile test<br>&bull; App can be run on rooted devices<br>&bull; Sensitive data plaintext stored in JSON files within the app was found<br>&bull; Developer successfully attempted to obtain administrator privileges by modifying APK files</p>
<p><span style="font-size: 14pt; color: #169179;"><strong>After application (LIAPP security profile application completed)</strong></span></p>
<p style="padding-left: 40px;">&bull; Structure cannot be identified due to source obfuscation and encryption during decompile<br>&bull; App automatically terminates in rooted and debugging environments<br>&bull; Data code encryption/obfuscation protects against theft of encryption logic<br>&bull; App execution is blocked when tampering is detected, and administrator notification is provided through log server integration</p>
<p>As a result, all internal security tests passed with a &lsquo;no abnormality&rsquo;,<br>and the IT audit also evaluated that &ldquo;the security level of business apps has significantly improved.&rdquo;</p>
<p>In addition, Company B&rsquo;s development team positively evaluated the introduction of LIAPP for the following reasons:<br>&ldquo;LIAPP is immediately secured by simply going through a simple security application procedure after APK build,<br>so there was no need to change the app structure and there was no burden on the development schedule at all. In particular, since various security options can be selected through profiling, the flexibility to adjust them as needed was good.&rdquo;</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Why You Should Start Securing Your Business Apps Right Now</strong></span></h3>
<p>Today, many companies are adopting **BYOD (bring your own device)**, but app security is essential to operate it safely.<br>If any of the following applies to you, strengthening mobile app security is urgent:</p>
<p style="padding-left: 40px;">&bull; Employees are using in-house apps on their personal smartphones<br>&bull; Apps contain customer information, contracts, and project documents<br>&bull; Lack of security personnel makes it difficult to respond directly<br>&bull; Recently, concerns have been raised about internal information leaks</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Protecting in-house apps from external threats with LIAPP</strong></span></h3>
<p>Although in-house mobile apps are introduced for work convenience and efficiency, if they are not secured, they can become the most dangerous window for corporate confidential information to be leaked.<br>As in the case of Company B, we hope you can maintain corporate-level security on your personal devices and effectively block data leaks and internal threats through **a simple and quickly applicable mobile security solution called &lsquo;LIAPP&rsquo;**.</p>
<p>#In-house app security #BYOD security #Mobile app security #LIAPP #LIAPP #Data leak prevention #Confidential information protection #Forgery prevention #Rooting blocking #Obfuscation #Business app security #Mobile security solution #Corporate security case</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/48-tech-officeapp-app-security</guid>
	<pubDate>2025-06-20 05:59:23</pubDate>
</item>
          <item>
	<title>Financial Security Institute, Mobile App Security Application Case for ISO Audit Passing</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/47-tech-ISO-Financial</link>
	<description><![CDATA[<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250702231217KRCktWU.png"></p>
<h2><span style="font-size: 24pt;">Financial Security Institute, Mobile App Security Application Case for ISO Audit Passing</span></h2>
<p>With the recent rapid growth of the fintech industry, the level of security requirements for financial apps is also increasing day by day.<br>In particular, in order to pass various domestic and international security certifications and audits such as ISO/IEC 27001, Financial Security Institute Security Review, and Electronic Financial Supervision Regulations, the security system of the app itself is very important.<br>To meet these security standards, many fintech companies are introducing mobile app security solutions, and LIAPP is a representative example that is attracting attention.</p>
<p>&nbsp;</p>
<h3><span style="font-size: 18pt; color: #e03e2d;"><strong>Successful Story of LIAPP Introduction by Fintech Company A</strong></span></h3>
<p>These days, if a company is preparing or operating a fintech service, the first wall they face is the security audit.<br>In particular, if they fail to pass the Financial Security Institute's prior security review, ISO 27001 certification, and Electronic Financial Supervision Regulations, it will be difficult to be authorized as an official financial service, and it may also hinder partnerships with partners or attracting investment.</p>
<p>In this post, we will introduce the necessity of mobile app security and the actual application effect in detail through the case of fintech company &lsquo;A&rsquo; that actually introduced LIAPP and passed the security audit.</p>
<p>&nbsp;</p>
<h4><span style="font-size: 14pt; color: #e03e2d;"><strong>Fintech company A, the reality faced before the financial security audit</strong></span></h4>
<p>In the second half of 2024, fintech company A completed the development of a simple investment platform app and was preparing for the service.<br>In order to launch the service, it was essential to receive the Financial Security Institute&rsquo;s security review and ISO 27001 certification, but after reviewing the audit items, there were many security requirements that were much more complicated and demanding than expected.</p>
<p style="padding-left: 40px;"><br>&nbsp;&bull; App forgery/alteration detection and response function<br>&nbsp;&bull; Blocking execution of rooted/jailbroken devices<br>&nbsp;&bull; Blocking malicious apps, debugging tools, and emulators<br>&nbsp;&bull; Encryption of important data (tokens, sessions, user information)<br>&nbsp;&bull; Source code protection and reverse engineering prevention</p>
<p>If there is a vulnerability in even one of these, it will be difficult to pass the certification audit, and there is a high risk of an actual security incident.<br>The problem was that there was a lack of internal security personnel and no ability to develop security functions directly.<br>At a time when concerns were growing within the team that &ldquo;it might take months just to implement the security module,&rdquo; the solution that Company A focused on was <strong>LIAPP</strong>.</p>
<p>&nbsp;</p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250703022237xbDK6ul.png"></p>
<p>&nbsp;</p>
<h4><span style="font-size: 14pt; color: #e03e2d;"><strong>Decision to introduce LIAPP &ndash; Strengthening security quickly and reliably</strong></span></h4>
<p>Company A considered the following criteria when reviewing the introduction of a security solution:</p>
<p style="padding-left: 40px;"><br>&nbsp;&bull; Must be able to meet security review items<br>&nbsp;&bull; Must be easy to introduce and not affect the development schedule<br>&nbsp;&bull; Must have proven cases in domestic financial/public institutions</p>
<p>The solution that met all three of these criteria was LIAPP.</p>
<p>LIAPP is a mobile app security service provided by Lockin Company that comprehensively strengthens app security through the following main functions:</p>
<p><span style="color: #169179;"><strong>Anti-counterfeiting and hacking detection</strong></span><br>LIAPP detects forgery and tampering in real time while the app is running, and if a manipulated app or hacking tool is detected, the app is immediately terminated or user access is blocked.<br>This plays a key role in ensuring the integrity of the app.</p>
<p><span style="color: #169179;"><strong>Rooting/jailbreak detection</strong></span><br>Running apps on rooted devices is extremely risky in terms of security.<br>LIAPP effectively blocks rooting, jailbreaking, and debugging tool detection functions, and satisfies the &lsquo;execution environment protection&rsquo; standard, which is an important item in security audits.</p>
<p><span style="color: #169179;"><strong>Source code obfuscation and encryption</strong></span><br>Hackers try to analyze the app&rsquo;s logic through decompiling.<br>LIAPP obfuscates and encrypts the app source code itself, making reverse engineering attacks difficult, and is excellent in preventing app analysis.</p>
<p><span style="color: #169179;"><strong>Sensitive data encryption</strong></span><br>LIAPP&rsquo;s encryption logic safely protects user data, session information, and authentication tokens stored in the app, preventing leakage attempts.<br>This is an important standard that also complies with the &lsquo;encryption control&rsquo; item of ISO 27001.</p>
<p>&nbsp;</p>
<h4><span style="font-size: 14pt; color: #e03e2d;"><strong>Actual application case &ndash; &lsquo;Passed&rsquo; security audit in 3 weeks</strong></span></h4>
<p>Company A&rsquo;s development team quickly decided to introduce LIAPP because it can load all the above functions with a simple task after building the app through the web-based security application platform provided by LIAPP.</p>
<p>Company A achieved the following results by introducing LIAPP: &bull; Passed Financial Security Institute pre-screening</p>
<p style="padding-left: 40px;"><br>&nbsp;&bull; Satisfied with technical security items during ISO 27001 certification preparation<br>&nbsp;&bull; Determination of &lsquo;No Risk&rsquo; in internal security diagnosis<br>&nbsp;&bull; Proven high resistance in external hacking simulation test</p>
<p>&nbsp;</p>
<h4><span style="font-size: 14pt; color: #e03e2d;"><strong>Actual review by developer of Company A</strong></span></h4>
<p>&ldquo;We wanted to focus only on development, but we needed a service that didn&rsquo;t require us to worry about security. LIAPP allowed us to pass the security screening without having to write our own security code, and we were very satisfied because we didn&rsquo;t have to change the app structure or modify the build method to add security features.&rdquo;</p>
<h4><span style="font-size: 14pt; color: #e03e2d;"><strong>Security is no longer a &lsquo;choice&rsquo; but a &lsquo;strategy&rsquo;</strong></span></h4>
<p>If you are preparing for financial and fintech services, security is not just a simple obligation, but a strategy for brand trust and service survival. In particular, if you are planning a certification screening or public institution partnership, establishing a thorough security system in advance is key, and introducing a verified security service such as LIAPP can be a very effective choice for this.</p>
<p>&nbsp;</p>
<h4><span style="color: #e03e2d;"><strong><span style="font-size: 14pt;">Preparing for a security screening quickly and solidly with LIAPP</span></strong></span></h4>
<p>The case of fintech company A shows that even a team lacking security resources can sufficiently pass the screening. With LIAPP, you can quickly meet security requirements while maintaining a high level of security without burdening the development schedule.</p>
<p>What if your app is in the following situation?</p>
<p style="padding-left: 40px;"><br>&nbsp;&bull; Preparing for Financial Security Institute security review<br>&nbsp;&bull; Ahead of ISO 27001 certification<br>&nbsp;&bull; Need security check before app store registration<br>&nbsp;&bull; Need external solution due to lack of security personnel</p>
<p>If you want to strengthen the security of your mobile app and be perfectly prepared from passing the review to responding to hacking, review LIAPP now.</p>
<p>#Fintech security #App security #LIAPP #ISO27001 #Financial Security Institute #Security review #Mobile app security #Forgery detection #Rooting blocking #Obfuscation #Data encryption #Fintech #App development security</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/47-tech-ISO-Financial</guid>
	<pubDate>2025-06-11 07:12:26</pubDate>
</item>
          <item>
	<title>&#039;Factory-style hackers&#039; who manipulate rankings with macros... Real-life security story blocked with LIAPP</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/46-tech-macro-ranking-game</link>
	<description><![CDATA[<p style="text-align: center;"><img src="https://djez7e2nzzqm3.cloudfront.net/guide/202507022310530wU18UM.png"></p>
<h2><span style="font-size: 24pt;">'Factory-style hackers' who manipulate rankings with macros... Real-life security story blocked with LIAPP</span></h2>
<p>Hello, if you are interested in mobile app security, I have something you must read.<br>Today, I will tell you about a mobile game that actually experienced factory-style hacking from China and how it was blocked and the game ecosystem was protected through LIAPP.</p>
<h3><br><strong><span style="font-size: 18pt; color: #e03e2d;">The ranking reliability suddenly collapsed one day</span></strong></h3>
<p>This case is the story of Company A's mobile game that had secured a global user base.<br>In particular, since the competition was strong and the user ranking structure affected the game content and rewards, maintaining the fairness of the ranking was the key to game operation.</p>
<p><strong>However, at some point, a strange phenomenon began to occur.</strong><br>&nbsp;&bull; Accounts that were not normally seen rose to the top of the rankings in one day,<br>&nbsp;&bull; Play patterns were consistent, and they repeated overly precise movements<br>&nbsp;&bull; Ranking points were accumulated at a speed that ordinary users could not keep up with.</p>
<p>The operations team, who detected something strange, immediately began analyzing it, and soon discovered that it was an organized manipulation using macros.</p>
<p><br>Hundreds of macro accounts automatically manipulated rankings overnight (the reality of factory hacking)<br><strong>The biggest characteristics of this attack were its &lsquo;scale&rsquo; and &lsquo;sophistication.&rsquo;</strong></p>
<p>It was not simply a few users attempting to cheat,&nbsp;but an automated system that operated hundreds of accounts simultaneously, so-called <strong><span style="color: #e03e2d;">&lsquo;factory hacking.&rsquo;</span></strong></p>
<p><strong>The main characteristics were as follows:</strong><br>&nbsp;&bull; Most traffic is concentrated on IPs in specific regions of China<br>&nbsp;&bull; Repeat the same behavior patterns at the same time interval<br>&nbsp;&bull; Analyze ranking algorithms to implement the most efficient play in the shortest time</p>
<p><br>As the 'fake rankers' created in this way quickly took over the top ranks, the competitive spirit of normal players rapidly decreased,<br>and negative reactions such as "the management is neglecting hacking" began to spread in the game community.</p>
<p>&nbsp;</p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250703022130TWXCYBa.png"></p>
<h3><br><strong><span style="font-size: 18pt; color: #e03e2d;">The counterattack of 'intelligent security' started by LIAPP</span></strong></h3>
<p>As the situation became serious, developer A urgently introduced the LIAPP security service.<br>Although there were basic security devices in the past, this attack was much more sophisticated, and it was difficult to detect without behavior-based analysis.</p>
<p><strong>LIAPP solved the problem through the following intelligent behavior-based detection functions:</strong></p>
<p><span style="font-size: 14pt; color: #169179;"><strong>Automated Tool Detection (Anti-Automation)</strong></span></p>
<p>LIAPP basically provides the ability to identify macros or auto-click tools.<br>It can detect not only simple touch simulations or key input automation, but also whether the device is rooted, traces of debugging tools, and whether an emulator is running.<br>Thanks to this feature, we were able to selectively identify accounts based on automated tools used by attackers, and take measures to classify and block suspicious accounts or exclude them from reward payments.</p>
<p><br><span style="color: #169179;"><strong><span style="font-size: 14pt;">Abnormal Behavior Analysis</span></strong></span></p>
<p>Macro attacks are often designed to play 'plausibly' like a human, rather than simply repeating.<br><strong>Based on the user's behavior log, LIAPP comprehensively analyzes the following factors:<br></strong>&nbsp;&bull; Repetition speed: A constant interval that cannot be achieved by humans<br>&nbsp;&bull; Accuracy of touch location: Clicking on an overly mechanical location<br>&nbsp;&bull; Response time: Same response speed regardless of the network, etc.</p>
<p>Through this behavior-based detection, we were able to distinguish between human manipulation and machine automation, and the 'fake ranker' accounts created by attackers were filtered out in an instant.</p>
<p><br><span style="font-size: 14pt; color: #169179;"><strong>Real-time response and account sanctions</strong></span></p>
<p>Even during an attack, LIAPP monitored suspicious activities in real time and provided information to the operation team to help them respond quickly.<br>Thanks to this, more than 90% of the core attack accounts were blocked in just 3 days, the ranking was normalized, and the trust of existing users was restored.</p>
<p>&nbsp;</p>
<h3><strong><span style="font-size: 18pt; color: #e03e2d;">Four lessons learned from this case</span></strong></h3>
<p>I have summarized the lessons that the developers and operations team directly experienced through this experience.</p>
<p><br><strong>1. Security is not an option, but a necessity<br></strong>&nbsp;&bull; To protect the fairness of the game and the trust of users, a preemptive defense system is needed, not a post-response one.</p>
<p><strong>2. Macros no longer move like machines<br></strong>&nbsp;&bull; Because many macros move like people these days, behavior-based security is essential.</p>
<p><strong>3. Factory-type attacks are repeated<br></strong>&nbsp;&bull; Once exposed, other hackers can attack in the same way, so continuous monitoring and response systems are important.</p>
<p><strong>4. Game security is the user experience<br></strong>&nbsp;&bull; This case clearly confirmed that creating a fair competitive environment leads to user satisfaction.</p>
<p>&nbsp;</p>
<h3><strong><span style="font-size: 18pt; color: #e03e2d;">Fair games, protected by smart security</span></strong></h3>
<p>Hacking and macros are no longer problems limited to specific games.<br>Especially if it's a game with a competitive element, it can be a target at any time.<br>But don't worry.<br>LIAPP goes beyond protecting the inside of the app, and is a service that can actually respond to intelligent attacks by analyzing the behavior of actual users.<br>Rather than rebuilding the game from scratch, it is a faster and more valuable choice to properly establish security now.</p>
<p>Are you worried about macro or ranking manipulation issues while operating the game?<br>If you want to introduce LIAPP, you can also request a demo on the official website!<br>I definitely recommend trying it out 😊</p>
<p>&nbsp;</p>
<p>#AppSecurity #GameAppSecurity #MobileAppSecurity #MobileGameSecurity #AppDevelopmentSecurity #MobileSecuritySolution #SecurityThreatBlocking #ForgeryDetection #RootingBlocking #Obfuscation #DataEncryption #MacroBlocking #AutomatedAttackDefense #RealTimeDetection #LIAPP #FactoryHacker #MacroSecurity</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/46-tech-macro-ranking-game</guid>
	<pubDate>2025-06-11 02:02:24</pubDate>
</item>
          <item>
	<title>How Secure Are Flutter Apps? A Comprehensive Guide to Security Vulnerabilities and Solutions</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/45-tech-flutter-app-security</link>
	<description><![CDATA[<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250415003903NCoPMDT.png"></p>
<h2 class="MsoNormal"><span style="font-size: 24pt;">How Secure Are Flutter Apps?</span></h2>
<h3><strong><span style="color: #e03e2d; font-size: 18pt;">What is Flutter?</span></strong></h3>
<p>Flutter is an open source framework for mobile application development developed by Google, and is based on the Dart language. It can be run on various platforms such as Android and iOS, as well as the web, desktop, and IoT devices, and is optimized for cross-platform development that supports multiple environments with a single code. Due to its fast development speed, high scalability, rich UI components, and animation support, it has recently established itself as a leader in mobile app development, and is being chosen by many developers and companies.</p>
<p>&nbsp;</p>
<h3><strong><span style="color: #e03e2d; font-size: 18pt;">Flutter App Security: Is It Really Worse Than Native Apps?</span></strong></h3>
<p>However, Flutter has some areas where security is lacking with only the basic settings, and these are often overlooked. In particular, security in the mobile environment is not an option but a necessity, but security considerations are often neglected due to the focus on convenience and speed of development.<br>Many developers may have the prejudice that "Flutter is cross-platform, so security is weak," but in reality, depending on the method and attitude of security implementation, a level of security comparable to that of native apps can be implemented. What is important is not the framework itself, but how security is applied.</p>
<p>Flutter apps can basically provide a similar level of security to native (Android/iOS) apps, but additional measures are required for code protection, data storage, and network security. In particular, they can be vulnerable to security threats such as code leakage through decompilation, unencrypted data storage, and man-in-the-middle attacks (MITM).&nbsp;In addition, recent mobile app hacking techniques are becoming increasingly sophisticated, going beyond simple code analysis to memory manipulation, network sniffing, and the use of automated tools. In particular, Flutter apps have AOT compilation and structural simplicity, so attackers can quickly figure out the code structure when reverse engineering, and traditional security methods alone have limitations in responding.</p>
<p>In this blog, we will analyze what vulnerabilities Flutter apps have in terms of security and take a closer look at the security enhancement methods that must be applied to develop a secure app.</p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/202504150041193weyx05.png"><br>&nbsp;</p>
<h3><strong><span style="color: #e03e2d; font-size: 18pt;">1. Security Vulnerabilities in Flutter Apps: Comparative Analysis with Native Apps</span></strong></h3>
<p><strong>1) Code protection issues: Risk of decompiling Dart code<br></strong>Dart, the base language of Flutter, has the advantage and disadvantage of being simple. It is intuitively easy to use, but for experienced developers, it is not as complicated as languages ​​like Kotlin or Swift. Dart is converted to native code through AOT (Ahead-of-Time) compilation during the build process. However, during this process, there is a risk that some metadata and code structures may be exposed through reverse engineering. In particular, if sensitive information such as authentication logic or API keys are included in the client code, there is a risk that they can be easily exposed through decompilation. Therefore, it is recommended to apply code obfuscation (--obfuscate, --split-debug-info) and protect the core security logic by separating it into native code on the Android or iOS side.</p>
<p><strong>2) Data storage vulnerability: Data storage is basically unencrypted.<br></strong>In order to store information in Flutter, the SharedPreferences package is commonly used. However, this method does not support encryption by default, so there is a risk that sensitive information such as tokens, login information, and personal information of users may be easily exposed. Therefore, when storing sensitive data such as login information or user identification values ​​(ID), it is recommended to store them using SecureStorage, and it is recommended to consider a structure in which sensitive information is managed on a server rather than locally if possible.</p>
<p><strong>3) Network security issues: MITM attacks are possible if SSL Pinning is not applied.<br></strong>Flutter apps usually use libraries like http or dio to process network requests when exchanging data with servers. Basic SSL authentication is applied during this process, but since the server certificate is not thoroughly checked for forgery, there is a risk of a man-in-the-middle attack (MITM) in which an attacker intercepts communication with a fake server. Especially when handling sensitive data such as login, payment, and user information, a secure connection between the app and the server is very important. To this end, by applying SSL Pinning, you can strengthen security by restricting the app to communicate only with normal servers with trusted certificates. It can be easily implemented in Flutter with dio settings or a dedicated plugin.</p>
<p><strong>4) Lack of security validation for packages (plugins)<br></strong>When developing Flutter apps, using various packages (plugins) can make development much easier, but using unverified packages can be dangerous. Some packages may require excessive permissions or may transmit sensitive data to the outside. Therefore, even for packages registered on pub.dev, you must check the rating, whether they have been recently updated, and whether they are open source code. If possible, it is safer to preferentially use packages provided by trusted developers or officially provided.</p>
<p>&nbsp;</p>
<h3><strong><span style="color: #e03e2d; font-size: 18pt;">2. How to strengthen Flutter app security with LIAPP</span></strong></h3>
<p>Flutter is convenient because it focuses on rapid development and UI-centric convenience, but in terms of security, it requires more careful management than native apps. As we have seen above, there is a risk of code exposure due to the characteristics of Dart code, and the high dependency on external packages can lead to unintended information leaks or security vulnerabilities. In addition, due to the cross-platform nature, there is a structure that makes it difficult to respond in detail to all security situations. To supplement these security vulnerabilities, you can apply powerful security functions to your app without additional development by utilizing the professional mobile app security service LIAPP.</p>
<p><strong>1) Critical code obfuscation &amp; encryption<br></strong>Apps made with Flutter are based on Dart code and are compiled and distributed as native library files such as libapp.so. These native files may contain actual business logic or sensitive processing, so there is a risk that the internal implementation can be stolen through reverse engineering.</p>
<p>Usually, data encryption is applied through the encrypt package in Flutter, but if the encryption logic and key exist inside the client, there is still a security vulnerability. Therefore, simple logic-level encryption is not enough, and measures to protect the native library itself are needed.</p>
<p>LIAPP can further strengthen security by providing integrity verification and anti-forgery prevention for the .so file containing the core logic of the Flutter app through the Native Library Protection function in addition to Java source obfuscation. If the existing Java code obfuscation function is also applied in parallel, a security environment that can respond to both native and hybrid structures is built.</p>
<p><strong>2) Data protection through various security features<br></strong>Flutter's flutter_secure_storage and sqflite_sqlcipher packages are effective in encrypting and storing sensitive data within the app, but the encryption logic or key itself can still be exposed, making complete protection difficult.</p>
<p>However, using a security solution such as LIAPP can enhance the overall security of the app by providing security features such as memory protection, debugging detection and blocking, rooting detection, virtual machine detection, and hacking tool detection.</p>
<p>LIAPP goes beyond simple data encryption to protect the entire app execution environment, helping to respond to advanced hacking techniques such as reverse engineering and memory tampering. In particular, it can prevent the leakage of logic or encryption keys containing sensitive information, which is a major advantage in that it can enhance the security of the execution unit that is difficult for developers to implement directly.</p>
<p><strong>3) Supplementing SSL Pinning from a network security perspective<br></strong>Applying SSL Pinning to network requests in Flutter can prevent basic MITM attacks, but open source code-based SSL Pinning is difficult to consider as a complete security measure because various bypass methods are already known.<br>Therefore, to strengthen Flutter network security, it is more effective to utilize LIAPP's SSL Pinning function to dynamically verify certificates during app execution and detect and block malicious proxies or abnormal network environments.</p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/202504150043174Yywqvu.png">&nbsp;</p>
<p>External packages used in Flutter are useful for accelerating development, but they can be vulnerable to security vulnerabilities, so caution is required. When selecting a package, it is recommended to check the GitHub star rating, recent commits, maintenance status, etc., and review suspicious permission requests or internal logic. It is also important to regularly check for package updates and use the latest version with security patches. Introducing a vulnerability scanner to the CI/CD pipeline will help detect security risks in advance. And most importantly, it is important not to rely solely on security-related packages, but to introduce a specialized security solution such as LIAPP to protect the integrity of the entire app and its execution environment. This will also prevent security incidents caused by package vulnerabilities in advance.</p>
<p>If you consistently manage these practices, your Flutter app can also build a strong security environment that is superior to that of native apps.</p>
<p>&nbsp;</p>
<p>LIAPP, Provides Only the Best Services</p>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/45-tech-flutter-app-security</guid>
	<pubDate>2025-04-15 04:19:38</pubDate>
</item>
          <item>
	<title>How to Secure Hybrid Apps</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/44-tech-hybrid-apps-security</link>
	<description><![CDATA[<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250124015630KmeN4Uu.png"></p>
<h2><span style="font-size: 24pt;">How to Secure Hybrid Apps</span></h2>
<h3><span style="color: #e03e2d; font-size: 18pt;">Why is hybrid app security important?</span></h3>
<p>A hybrid app is a development method that uses web technologies (HTML, CSS, JavaScript) to create content areas such as screens and functions of an app, and packages them in a native container for app market registration and installation.By using both development approaches, you can use both web and app APIs, and access device-specific features that are not possible in web apps. While hybrid apps are a great way to take advantage of the power of web technology while maintaining the performance and user experience of native apps, they can reduce development time and costs, but there are many security vulnerabilities. Hybrid apps include web-based elements, so they inject malicious code, Because you may be exposed to risks such as data leakage and repackaging, you need strong security measures to protect your users' data and maintain the integrity of your app.&nbsp;</p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250124053937rZyr4ds.png"></p>
<p>&nbsp;</p>
<h3><span style="color: #e03e2d; font-size: 18pt;">Key differences between hybrid and native app security</span></h3>
<p>Native app security is optimized for a specific platform so that you can directly leverage the security features of the operating system, but you need to consider the security measures specific to each platform separately. On the other hand, hybrid app security is based on web technologies and runs on a variety of platforms, so the potential for exposure to web vulnerabilities is relatively high. These two development approaches have distinct security differences in terms of structure, data storage, security updates, and reverse engineering.</p>
<p><strong>1. Structure and technology stack</strong><br>- Native apps: Developed for a specific platform (iOS, Android, etc.), you can use the platform's APIs and features directly to take advantage of the platform's unique security features.<br>- Hybrid apps: Developed using web technologies such as HTML, CSS, and JavaScript, and run on native platforms via web views, which can make them vulnerable to web-based attacks (e.g., XSS, CSRF).</p>
<p><strong>2. How we store your data:</strong><br>- Native apps: Data is typically stored in the platform's secure vaults (e.g., Keychain on iOS, SharedPreferences on Android), which are highly secure.<br>- Hybrid apps: Data can be stored within a web view or stored in local storage, making it easy for attackers to gain access to the data.</p>
<p><strong>3. Security Updates:</strong><br>- Native apps: They must be deployed to users when they are updated, and they must be re-registered and approved. Even if the modified app is well registered, existing installers will need to update before the modified version can be used.<br>- Hybrid apps: They use web technologies, so any code updates on the server side can be immediately reflected in the client app. However, this is a risk if the security of the server is weak.</p>
<p><strong>4. Reverse Engineering:</strong><br>- Native apps: Native code is included, which can make reverse engineering more complex, but there are still security risks.<br>- Hybrid apps: Contains code written on web technologies, making it relatively easy to reverse engineer.</p>
<p>These differences affect the security approach of hybrid and native apps, and it's important to have a security strategy tailored to each type of app.</p>
<p>&nbsp;</p>
<h3><span style="color: #e03e2d; font-size: 18pt;">How to Secure Hybrid Apps?</span></h3>
<p><strong>1. Source code protection</strong></p>
<p>Hybrid apps use web technologies such as HTML, CSS, and JavaScript, so the source code can be decompiled and analyzed relatively easily. This can be exploited by attackers to gain insight into your app's logic, structure, API keys, and more. In addition, if sensitive information such as API keys, encryption keys, and server URLs contained in the source code is not protected, it can be exploited to cause unauthorized access or data leakage. In addition, if the source code is exposed, attackers can tamper with the app or inject malicious code to harm users, and competitors can copy or use it without permission. Therefore, source code obfuscation and encryption should be used to prevent analysis of source code and core logic.</p>
<p><em>LIAPP obfuscates the source code, making it difficult for hackers to understand the internal structure of the app. This prevents attacks through code analysis. You can also protect native code libraries to protect sensitive algorithms, keys, sensitive data, and more.</em></p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20250124054217m23NtqE.png"></p>
<p><strong>2. &nbsp; &nbsp;Use strong encryption algorithms</strong></p>
<p>Hybrid app source information includes information for web access, as well as information for services that need to be kept confidential, such as finance or payments. Hybrid apps are particularly vulnerable to attacks due to the exchange of data between native code and web views, API calls, and so on, so it's imperative to encrypt sensitive user data before storing or transmitting it. It securely stores sensitive data on your device, does not store sensitive information in plain text, and uses encryption technology to protect data at rest.&nbsp;</p>
<p><em>Mobile App Security Keypad LIKEY is a security keypad service designed to keep users' personal information safe. LIKEY uses encryption algorithms to protect the information you enter, encrypting all information you enter as well as encrypting and storing the data you enter. &nbsp;In doing so, it uses a unique encryption algorithm to protect the user's input from being exposed to the outside world. All information you enter is stored encrypted, making it difficult for hackers to intercept and decrypt it. This greatly improves the security of the app on mobile.</em></p>
<p><strong>3. Web View Security<br></strong></p>
<p>In hybrid apps, the web view acts as a link between native and web content and is prone to security vulnerabilities. To avoid this, if you access native code via JavaScript, you should validate the input data and expose the interface to a limited extent. You should also set to allow only trusted domains when loading external URLs and prevent web views from accessing local files to prevent file-based attacks.</p>
<p><em>LIAPP protects the JavaScript interface in the web view, preventing external attackers from exploiting the app's functionality. This makes your app more secure.</em></p>
<p><strong>4. App integrity verificationIn&nbsp;</strong></p>
<p>hybrid apps, verifying the integrity of an app is an important security measure to prevent the app from being tampered with or malware injected. If an app is tampered with after it is deployed, it can cause damage to users, such as injecting malicious code and stealing data, so integrity verification is necessary to prevent this. To do this, the app must be deployed signed, and the signature must be validated at runtime. However, the logic to verify integrity is also contained inside the app, so even this logic above there is a risk of tampering.&nbsp;</p>
<p><em>For this reason, the app integrity verification logic must also be protected through LIAPP's source code obfuscation and source code encryption technology.</em></p>
<p><strong>5. Deployment and Update Security</strong></p>
<p>Hybrid apps are vulnerable to security threats when deployed or updated. If you deploy and update insecurely, there is a high chance that a malicious attacker will tamper with the app's installation files (APK, IPA, etc.) or distribute malware through fake updates. To increase security during the deployment and update of hybrid apps, you should distribute them through official app stores and apply digital signatures to prevent app tampering. In addition, it is important to control access to the backend server where the update files are stored and manage the security. You should keep your apps and dependencies up to date with security patches and software updates, while frequently updating libraries, frameworks, and SDKs to the latest versions to minimize security risks.</p>
<p><em>LIAPP finds vulnerabilities and strengthens security through pre-deployment app analysis of hybrid apps. It also uses anti-repackaging to prevent unauthorized changes to the app and ensure secure file distribution. In addition, security settings can be adjusted on/off on the fly without redeploying apps, allowing you to quickly change security policies.</em></p>
<p>&nbsp;</p>
<p>Hybrid app security is essential to maintaining user data protection and trust. It's important to check your source code and update your library to minimize risks, and you should proactively identify vulnerabilities in your app through regular security audits. In addition, sensitive information can be kept safe through thorough user authentication and data encryption. It's also important to educate and raise awareness of users to create a culture of safe app use. After all, with thorough security management, hybrid apps will be able to establish themselves as a trusted platform that users can use with confidence.</p>
<p>LIAPP, we provide the best service possible.&nbsp;</p>
<div class="text-center mt-10 mb-10"><a class="btn btn-sm btn-liapp mr-2 rounded-full" style="text-decoration: none !important;" href="https://liapp.lockincomp.com/index.php/ja/blog">TECH BLOG</a> <a class="btn btn-sm btn-liapp ml-2 rounded-full" style="text-decoration: none !important;" href="https://liapp.lockincomp.com/index.php/ja/pricing">LIAPP PRICING</a></div>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/44-tech-hybrid-apps-security</guid>
	<pubDate>2025-01-24 05:45:45</pubDate>
</item>
          <item>
	<title>Fintech’s Ultimate Security Playbook: Real-Time Threat Detection Without Compromising User Experience</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/43-tech-fintech-security</link>
	<description><![CDATA[<p><span class="SCXW221068689 BCX0"><span class="WACImageContainer NoPadding DragDrop BlobObject SCXW221068689 BCX0" role="presentation"><img class="WACImage SCXW221068689 BCX0" src="https://djez7e2nzzqm3.cloudfront.net/guide/20241202051229tVRDXW8.png" alt="텍스트, 회로, 전자제품, 전자 공학이(가) 표시된 사진

자동 생성된 설명"></span></span></p>
<p>&nbsp;</p>
<p>Imagine a digital landscape where every transaction is a potential target for cyber threats. In the fintech world, this is the reality&mdash;a high-stakes environment demanding innovative security solutions that protect without slowing down business operations.&nbsp;</p>
<p>Welcome to the ultimate security playbook for fintech leaders, where real-time threat detection meets zero-trust principles, ensuring your digital assets are safeguarded while delivering a seamless user experience.</p>
<p>&nbsp;</p>
<h2><strong><span style="color: #e03e2d;">The Balancing Act: Robust Security Meets Seamless User Experience</span></strong></h2>
<p>In fintech, security is non-negotiable. However, implementing robust measures shouldn't come at the expense of user experience. A seamless experience is crucial for customer retention and trust. The key is to strike a balance&mdash;implementing advanced security that operates in the background, providing a secure yet user-friendly experience.</p>
<p>&nbsp;</p>
<h2><strong><span style="color: #e03e2d;">Real-Time Threat Detection: The Heart of Fintech Security</span></strong></h2>
<p>Real-time threat detection is essential for identifying and neutralizing threats as they occur. Key components include behavioral analytics, continuous monitoring, and AI-driven predictive detection.</p>
<p>&nbsp;</p>
<h2><strong><span style="color: #e03e2d;">Zero-Trust Security: A Non-Negotiable in Fintech</span></strong></h2>
<p>Zero-Trust Security assumes no user or system is trustworthy by default. It requires verification for every access attempt, making it essential for protecting sensitive financial data.</p>
<p>&nbsp;</p>
<h2><strong><span style="color: #e03e2d;">Compliance: Navigating the Regulatory Maze</span></strong></h2>
<p>Fintech companies must adhere to regulations like GDPR, PSD2, and CCPA to ensure data privacy and security. Understanding these obligations builds a secure and trustworthy platform.</p>
<p>&nbsp;</p>
<h2><strong><span style="color: #e03e2d;">Phishing Protection: Your First Line of Defense</span></strong></h2>
<p>Phishing attacks pose significant threats. Implementing robust phishing protection measures is crucial to safeguard users and maintain platform integrity.</p>
<p>&nbsp;</p>
<h2><strong><span style="color: #e03e2d;">Encryption and Tokenization: Safeguarding Financial Transactions</span></strong></h2>
<p>Encryption ensures data remains unreadable to unauthorized parties, while tokenization replaces sensitive data with non-sensitive equivalents, protecting transactions even if a breach occurs.</p>
<p>&nbsp;</p>
<h2><strong><span style="color: #e03e2d;">Building a Culture of Security: Training, Awareness, and Customer Trust</span></strong></h2>
<p>Security is not just technical; it's cultural. Fostering an environment where every team member understands its importance enhances customer trust.</p>
<p>&nbsp;</p>
<h2><strong><span style="color: #e03e2d;">Communicating Complex Security Measures Effectively</span></strong></h2>
<p>Clear communication of security protocols is crucial. Use analogies and simple language to explain complex concepts to non-technical team members.</p>
<p>&nbsp;</p>
<h2><span style="color: #e03e2d;">How Lockin's LIAPP Can Help</span></h2>
<p>Lockin's LIAPP offers comprehensive solutions tailored for fintech security:<br><strong>&bull; </strong>Zero-Trust Implementation: Enforces two-factor authentication and real-time monitoring to ensure only authorized access.<br><strong>&bull; </strong>Real-Time Threat Detection: Utilizes AI-driven analytics to identify threats instantly without disrupting service.<br><strong>&bull; </strong>Phishing Protection: Detects and blocks remote-control apps used in phishing attacks.<br><strong>&bull; </strong>Encryption and Obfuscation: Protects sensitive data through robust encryption techniques.<br><strong>&bull; </strong>User-Friendly Integration: Seamlessly integrates with existing systems, offering powerful protection with minimal disruption.</p>
<p>By employing LIAPP's advanced features, fintech companies can enhance their security posture while maintaining an excellent user experience.</p>
<p>&nbsp;</p>
<h2><strong><span style="color: #e03e2d;">Conclusion: The Future of Fintech Security</span></strong></h2>
<p>The future of fintech security is dynamic. With proactive strategies like real-time threat detection and zero-trust models, fintech firms can stay ahead of threats while ensuring secure transactions without compromising user experience. By leveraging solutions like LIAPP, companies can build trust and ensure long-term success in an increasingly digital world.</p>
<p>Want to see LIAPP&rsquo;s real-time detection in action? Request a demo today and learn how Lockin can secure your mobile app against emerging threats.</p>
<p>&nbsp;</p>
<p>LIAPP, we provide the best service possible.&nbsp;</p>
<div class="text-center mt-10 mb-10"><a class="btn btn-sm btn-liapp mr-2 rounded-full" style="text-decoration: none !important;" href="https://liapp.lockincomp.com/index.php/ja/blog">TECH BLOG</a> <a class="btn btn-sm btn-liapp ml-2 rounded-full" style="text-decoration: none !important;" href="https://liapp.lockincomp.com/index.php/ja/pricing">LIAPP PRICING</a></div>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/43-tech-fintech-security</guid>
	<pubDate>2024-12-02 06:32:31</pubDate>
</item>
          <item>
	<title>Mastering Real-Time Threat Detection: How LIAPP Revolutionizes Mobile App Security</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/42-tech-real-time-threat-detection</link>
	<description><![CDATA[<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20241111062053IFAuXJU.png"></p>
<p>&nbsp;</p>
<p>Mobile apps are now integral to industries like fintech, healthcare, and gaming, but with this growth comes increased cyber threats. In this landscape, real-time threat detection is no longer optional&mdash;it&rsquo;s essential. Monitoring, detecting, and responding to threats in real-time is vital to ensuring app security and user trust.</p>
<p><br>LIAPP, a leading mobile app security solution, offers cutting-edge real-time detection and instant response capabilities, providing a robust defence for mobile apps across industries. This blog will explore how LIAPP sets a new standard in real-time threat detection and why it&rsquo;s the preferred solution for businesses prioritising app security.</p>
<h2><br><span style="color: #e03e2d;"><strong>The Growing Need for Real-Time Threat Detection in Mobile Apps</strong></span></h2>
<p>The rapid digital transformation has spurred the growth of mobile apps, but it has also introduced new vulnerabilities. Data breaches and hacking attempts can occur within moments in sectors like fintech and gaming.</p>
<p><br>Based on IBM's Cost of a Data Breach Report 2024, here are two key facts about cyber threats:</p>
<p><br>1. The global average data breach cost reached $4.88 million in 2024, a 10% increase from the previous year. As cyber threats evolve, the need for proactive measures becomes increasingly critical. Organizations must not only implement robust security protocols but also foster a culture of security awareness among their teams. Training employees to recognize potential threats, such as phishing attempts or suspicious app behavior, can significantly reduce the risk of breaches.&nbsp;<br>2. Compromised credentials were the most common initial attack vector, accounting for 16% of all breaches and taking an average of 292 days to identify and contain. With the raising of hacking tools, waiting to patch vulnerabilities is no longer viable. Businesses need solutions that can monitor app security in real-time, identifying threats as they happen and responding immediately.</p>
<h2><br><span style="color: #e03e2d;"><strong>How LIAPP Powers Real-Time Threat Detection</strong></span></h2>
<p>LIAPP is designed to provide real-time security monitoring, ensuring that any suspicious activity is detected and blocked instantly.</p>
<p><br><strong>Key Features:<br></strong><strong>Real-Time Detection Statistics: </strong>LIAPP offers users detailed real-time threat statistics, giving insights into emerging attacks and vulnerabilities.<br><strong><br>Flexible Security Adjustments:</strong> One of LIAPP&rsquo;s standout features is its ability to change security settings in real-time&mdash;without the need for re-distribution through app stores like Google Play or the App Store. This unique capability allows businesses to adapt to threats immediately, providing flexibility not seen in other mobile app security tools.<br>By tracking security threats as they occur, LIAPP empowers developers and security teams to take preventative action before a breach can happen, minimizing risk and protecting user data.</p>
<p>&nbsp;</p>
<h2><strong><span style="color: #e03e2d;">Applications of Real-Time Detection in Key Industries</span></strong></h2>
<p><strong>Fintech: Securing Financial Transactions</strong><br>In fintech, real-time threat detection is crucial. Financial apps handle sensitive user data, and a security breach can result in massive economic losses and regulatory penalties. LIAPP&rsquo;s real-time detection ensures instant monitoring of suspicious activities, protecting against phishing, fraud, and data tampering.</p>
<p><strong>Healthcare: Protecting Patient Data</strong><br>Patient data security is paramount for telemedicine platforms and healthcare apps. LIAPP ensures compliance with regulations by providing real-time detection of unauthorised access or data manipulation, ensuring that personal health information remains secure.</p>
<p><strong>Gaming: Preventing Cheats and Fair Play</strong><br>The gaming industry is especially vulnerable to cheat tools and memory tampering. LIAPP&rsquo;s ability to detect and block these activities in real-time protects game integrity and ensures fair play, offering anti-cheat solutions that secure in-app purchases and player engagement.</p>
<p><strong>The Flexibility of Real-Time Security Adjustments with LIAPP</strong><br>One of the biggest challenges in mobile security is the time it takes to redistribute apps when security settings need to be updated. For many businesses, this delay creates a window of vulnerability where hackers can exploit weaknesses.</p>
<p><br><strong>LIAPP&rsquo;s Solution:</strong><br>LIAPP allows users to adjust security settings on the fly without redistributing the app. This saves both time and resources while ensuring the app stays secure without interruption.<br>Security settings can be adjusted based on real-time threat data, ensuring businesses can stay one step ahead of potential attackers.</p>
<p>&nbsp;</p>
<h2><span style="color: #e03e2d;"><strong>LIAPP&rsquo;s Action-Based Detection: Beyond Static Defense</strong></span></h2>
<p>While most security tools rely on lists of known threats, LIAPP takes a more dynamic approach by offering action-based detection. This means LIAPP monitors apps&rsquo; behavior in real time, identifying suspicious activity based on actions rather than simply scanning for known malware or tools.<br>This approach is critical for cheat detection in gaming and data security in fintech and healthcare.<br>LIAPP&rsquo;s action-based detection can identify suspicious behavior like a cheat tool modifying game data or unauthorized access to financial records, stopping the attack before it can cause damage.</p>
<p>&nbsp;</p>
<h2><strong><span style="color: #e03e2d;">Why LIAPP is Leading the Future of Mobile Security</span></strong></h2>
<p>With mobile apps constantly under threat from hackers and cybercriminals, businesses need a solution that can adapt in real time to protect their apps and data. LIAPP provides this flexibility through real-time threat detection, instant security adjustments, and action-based detection, making it the go-to solution for mobile app security in industries like fintech, gaming, and healthcare.</p>
<p>For businesses looking to strengthen their app security, LIAPP offers an unparalleled combination of advanced technology and ease of use. Don&rsquo;t hesitate to contact the LIAPP team to learn more about how real-time threat detection can protect your business.</p>
<p>Want to see LIAPP&rsquo;s real-time detection in action? Request a demo today and learn how Lockin can secure your mobile app against emerging threats.</p>
<p>&nbsp;</p>
<p>LIAPP, we provide the best service possible.&nbsp;</p>
<div class="text-center mt-10 mb-10"><a class="btn btn-sm btn-liapp mr-2 rounded-full" style="text-decoration: none !important;" href="https://liapp.lockincomp.com/index.php/ja/blog">TECH BLOG</a> <a class="btn btn-sm btn-liapp ml-2 rounded-full" style="text-decoration: none !important;" href="https://liapp.lockincomp.com/index.php/ja/pricing">LIAPP PRICING</a></div>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/42-tech-real-time-threat-detection</guid>
	<pubDate>2024-11-11 06:57:56</pubDate>
</item>
          <item>
	<title>The Complete Guide to DevSecOps: Building a Secure Mobile App Development Environment</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/41-tech-DevSecOps</link>
	<description><![CDATA[<p><span class="SCXW47526388 BCX0"><span class="WACImageContainer NoPadding DragDrop BlobObject SCXW47526388 BCX0" role="presentation"><img class="WACImage SCXW47526388 BCX0" src="https://liapp-dev-web.s3.ap-northeast-2.amazonaws.com/guide/20241024012659mny0AOf.png" alt="텍스트, 컴퓨터, 의류, 개인용 컴퓨터이(가) 표시된 사진

자동 생성된 설명"></span></span></p>
<p>&nbsp;</p>
<h2><span style="color: #e03e2d;">What is DevSecOps?&nbsp;</span></h2>
<p>DevSecOps stands for Development, Security, and Operation which refers to a development culture that emphasizes security at every stage of the software development process. In traditional IT organizations, development, operations, and security were typically separated, with clear responsibilities respectively. However, in today&rsquo;s fast-paced business and ICT environment, IT operations need to be more efficient, with shorter development cycles that allow for quick feedback and iterative improvements. This approach helps organizations adapt to rapidly changing market conditions. As a result, the concept of DevSecOps emerged, integrating security throughout the entire IT lifecycle from development and deployment to operations and management.&nbsp;</p>
<p><img src="https://liapp-dev-web.s3.ap-northeast-2.amazonaws.com/guide/20241024013221z7ygPgK.png"></p>
<p>&nbsp;</p>
<div class="OutlineElement Ltr SCXW229572556 BCX0">
<div class="OutlineElement Ltr SCXW11892384 BCX0">
<h2><span style="color: #e03e2d;">Why is DevSecOps Necessary in Mobile App Development?&nbsp;</span></h2>
<p>DevSecOps is a new approach that stresses the importance of security in a fast-changing digital environment. By incorporating security early in the development process, vulnerabilities can be identified and fixed at an early stage as well. This allows developers to maintain agile development speeds while enhancing security. This approach helps prevent serious security threats like data breaches and system damage, fosters collaboration between development and security teams, and improves the overall quality of software. DevSecOps has become a crucial strategy, not a mere option.&nbsp;</p>
<p>Additionally, DevSecOps is mandatory in mobile app development because it ensures both rapid deployment and security. With real-time monitoring and automated updates, it enables ongoing responses to security threats. Automated security testing identifies and fixes code vulnerabilities early on, ensuring consistent security across various mobile environments. Moreover, collaboration between development, security, and operations teams ensures that security is embedded throughout every stage of development.&nbsp;</p>
<p>&nbsp;</p>
<h2><span style="color: #e03e2d;">Key Principles of DevSecOps&nbsp;</span></h2>
<p>One of the core principles of DevSecOps is the concept of "shift left," which means addressing security early in the design and coding phases. In this approach, app developers integrate security testing as early as possible, identifying and fixing vulnerabilities at the beginning of the development process. This shifts security from a reactive approach to a proactive one, with the goal of catching and addressing vulnerabilities during code creation. Additionally, automating security testing and vulnerability checks helps maintain consistent security throughout the development cycle. By leveraging automation, DevSecOps increases the efficiency of security checks, reduces human errors, and fosters a safer development environment, enabling both speed and security.&nbsp;</p>
</div>
</div>
<div class="OutlineElement Ltr SCXW229572556 BCX0">
<div class="OutlineElement Ltr SCXW171661877 BCX0">
<p class="Paragraph SCXW171661877 BCX0">&nbsp;</p>
<p class="Paragraph SCXW171661877 BCX0"><img src="https://liapp-dev-web.s3.ap-northeast-2.amazonaws.com/guide/20241024013312kj2iLl3.png"></p>
<p class="Paragraph SCXW171661877 BCX0">&nbsp;</p>
<div class="OutlineElement Ltr SCXW68385275 BCX0">
<h2><span style="color: #e03e2d;">Effective Mobile App Security through DevSecOps&nbsp;</span></h2>
<p>To successfully implement DevSecOps in mobile app development, various tools and techniques are required. By integrating Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) into the CI/CD pipeline, clear vulnerabilities that could pose serious threats to the business can be identified from the early stages of development. Mobile security services like LIAPP provide source code protection, obfuscation, and anti-tampering features to maintain security even after app distribution.&nbsp;</p>
<p>&nbsp;</p>
<h2><span style="color: #e03e2d;">Mobile App Development Process with DevSecOps&nbsp;</span></h2>
<p>In DevSecOps, it's essential to integrate security throughout the mobile app development process. From the design phase, threat modeling and risk analysis are performed to define security requirements. During coding, static analysis tools help detect and fix vulnerabilities early. At the deployment stage, secure signing is essential, and automated tools are used to configure the infrastructure to security standards. By integrating security testing into the CI/CD pipeline, vulnerabilities are continuously checked and resolved, ensuring that the application operates securely in the end.&nbsp;</p>
<p>&nbsp;</p>
<h2><span style="color: #e03e2d;">Strengthening Real-Time Security through Monitoring and Vulnerability Management in DevSecOps&nbsp;</span></h2>
<p>Continuous monitoring and vulnerability management are key to strengthening real-time security in DevSecOps. LIAPP&rsquo;s real-time threat detection collects and analyzes various logs and security event data generated while using the app, allowing it to quickly detect anomalies or vulnerabilities within the system. This enables real-time security monitoring, with automated vulnerability scanning performing periodic security checks. LIAPP&rsquo;s monitoring features allow for quick responses to potential security threats, and immediate remediation actions minimize damage when vulnerabilities are found. Continuous monitoring and management processes are crucial security defense measures in a DevSecOps environment.&nbsp;</p>
</div>
<div class="OutlineElement Ltr SCXW189438259 BCX0">
<div class="OutlineElement Ltr SCXW135285027 BCX0">
<p class="Paragraph SCXW135285027 BCX0">&nbsp;</p>
<p class="Paragraph SCXW135285027 BCX0"><span class="EOP SCXW135285027 BCX0" data-ccp-props="{"><span class="SCXW219938772 BCX0"><span class="WACImageContainer NoPadding DragDrop BlobObject SCXW219938772 BCX0" role="presentation"><img class="WACImage SCXW219938772 BCX0" src="https://liapp-dev-web.s3.ap-northeast-2.amazonaws.com/guide/20241024013338K1r4KSG.png"></span></span></span></p>
<p class="Paragraph SCXW135285027 BCX0">&nbsp;</p>
<div class="OutlineElement Ltr SCXW3745538 BCX0">
<div class="OutlineElement Ltr SCXW72143494 BCX0">
<div class="OutlineElement Ltr SCXW101853372 BCX0">
<h2><span style="color: #e03e2d;">Protecting the Mobile App Development Environment with DevSecOps&nbsp;</span></h2>
<p>DevSecOps enhances both the security and efficiency of an organization by embedding security across the entire development environment. Integrating security from the beginning of development and continuously managing vulnerabilities through automated tools and monitoring allows for the rapid and secure deployment of mobile apps. DevSecOps is not just a technical change but a cultural shift that promotes collaboration and shared responsibility among teams. As mobile app threats evolve rapidly, DevSecOps will continue to be an essential element for responding to these challenges, allowing organizations to achieve long-term security reinforcement.&nbsp;</p>
<p>&nbsp;</p>
<h2><span style="color: #e03e2d;">The Role of LIAPP in DevSecOps&nbsp;</span></h2>
<p>Applying LIAPP from the early stages of app development ensures strong security measures. LIAPP offers various mobile security features such as source code protection, obfuscation, anti-tampering, and rooting detection, maintaining continuous security even after the app is distributed. DevSecOps integrates and automates these security features throughout the development cycle, enhancing both development speed and security. Including LIAPP in the DevSecOps pipeline allows for early detection and response to code vulnerabilities and security threats, maximizing the safety of mobile apps.&nbsp;</p>
<p>&nbsp;</p>
<p>LIAPP, we provide the best service possible.&nbsp;</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="text-center mt-10 mb-10"><a class="btn btn-sm btn-liapp mr-2 rounded-full" style="text-decoration: none !important;" href="https://liapp.lockincomp.com/index.php/ja/blog">TECH BLOG</a> <a class="btn btn-sm btn-liapp ml-2 rounded-full" style="text-decoration: none !important;" href="https://liapp.lockincomp.com/index.php/ja/pricing">LIAPP PRICING</a></div>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/41-tech-DevSecOps</guid>
	<pubDate>2024-10-24 01:47:43</pubDate>
</item>
          <item>
	<title>How to Prevent Mobile Phishing</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/40-tech-Prevent-Mobile-Phishing</link>
	<description><![CDATA[<h2>How to Prevent Mobile Phishing&nbsp;</h2>
<h3>Prevent Mobile Phishing with Remote Control App Detection &nbsp;</h3>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20240912063611fZxM9Wf.png"></p>
<p>&nbsp;</p>
<p><strong><span style="font-size: 14pt; color: #e03e2d;">What is Phishing?&nbsp;</span></strong></p>
<p>Phishing is a combination of the words &ldquo;private data&rdquo; and &ldquo;fishing,&rdquo; referring to a hacking technique used to steal sensitive personal information such as passwords, credit card numbers, social security numbers, and other important data. Typically, phishing disguises itself as a message from a trusted person or well-known company, luring the victim to a fake website to enter personal information or prompting them to download malicious malware.&nbsp;</p>
<p>Like many common threats, phishing began in the 1990s with the rise of the internet. Back then, hackers impersonated AOL (a company in US) employees to steal accounts and in the 2000s, phishing emails tricked users into revealing bank account information, or hackers would steal eBay and Google accounts to commit fraud, steal money, or send spam to other users.&nbsp;</p>
<p><strong><span style="font-size: 14pt; color: #e03e2d;">The Rise of Mobile Phishing: From Email to Social Media - The Evolution of Phishing Attacks and New Threats&nbsp;</span></strong></p>
<div class="OutlineElement Ltr SCXW117470414 BCX0">
<p class="Paragraph SCXW117470414 BCX0"><span class="TextRun SCXW117470414 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW117470414 BCX0">Hackers use phishing emails because they are easy, </span><span class="NormalTextRun SCXW117470414 BCX0">cheap</span><span class="NormalTextRun SCXW117470414 BCX0">, and effective. Email addresses are </span><span class="NormalTextRun SCXW117470414 BCX0">very </span><span class="NormalTextRun SCXW117470414 BCX0">easy</span><span class="NormalTextRun SCXW117470414 BCX0"> to obtain, and since sending emails is </span><span class="NormalTextRun SCXW117470414 BCX0">virtually free</span><span class="NormalTextRun SCXW117470414 BCX0">, hackers can access sensitive data with </span><span class="NormalTextRun SCXW117470414 BCX0">minimal effort and cost. </span><span class="NormalTextRun SCXW117470414 BCX0">As the digital environment has evolved and mobile device usage has increased dramatically, mobile phishing attacks have surged by 85% over the past five years.</span></span><span class="TextRun SCXW117470414 BCX0" lang="KO-KR" xml:lang="KO-KR" data-contrast="auto"><span class="NormalTextRun SCXW117470414 BCX0">&nbsp;</span></span><span class="EOP SCXW117470414 BCX0" data-ccp-props="{">&nbsp;</span></p>
</div>
<div class="OutlineElement Ltr SCXW117470414 BCX0">
<p class="Paragraph SCXW117470414 BCX0"><span class="TextRun SCXW117470414 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW117470414 BCX0">Several factors make phishing attacks more successful and harder to detect on mobile devices than on PCs.</span></span><span class="EOP SCXW117470414 BCX0" data-ccp-props="{">&nbsp;</span></p>
</div>
<div class="OutlineElement Ltr SCXW117470414 BCX0">
<p class="Paragraph SCXW117470414 BCX0"><span class="TextRun SCXW117470414 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW117470414 BCX0">First, mobile devices </span><span class="NormalTextRun SCXW117470414 BCX0">generally have</span><span class="NormalTextRun SCXW117470414 BCX0"> fewer filtering and spam detection features. Messages sent through mobile apps often </span><span class="NormalTextRun SCXW117470414 BCX0">contain</span><span class="NormalTextRun SCXW117470414 BCX0"> short messages and malicious URLs, </span><span class="NormalTextRun SCXW117470414 BCX0">similar to</span><span class="NormalTextRun SCXW117470414 BCX0"> email phishing. Sometimes these messages appear as requests to update credit card details for an Amazon order or to provide more information for renewal. This rise in phishing through basic mobile SMS and MMS applications has led to the creation of a new term: "smishing" (SMS phishing).</span></span><span class="EOP SCXW117470414 BCX0" data-ccp-props="{">&nbsp;</span></p>
</div>
<p>&nbsp;</p>
<p><span style="font-size: 14pt;"><strong><span style="color: #e03e2d;">Why Phishing Attacks are Effective on Mobile Devices&nbsp;</span></strong></span></p>
<p>1. Mobile Interface&nbsp;</p>
<p>Unlike PCs, the mobile interface can hide many warning signs. On a desktop, users can hover over a link to verify whether the web address is legitimate or not. But on mobile, device this option is not available, thus making it harder to detect if a link is malicious. Additionally, traditional protection measures such as firewalls, secure email gateways, and endpoint protection are not as widely available on mobile devices, making it easier for hackers to launch attacks.&nbsp;</p>
<p>2. SMS, Messaging App and Social Media&nbsp;</p>
<p>Hackers don&rsquo;t limit their activities to email on mobile devices. The most active platforms for mobile phishing are social media and messaging apps such as Facebook, LinkedIn, and Instagram. Users are generally less suspicious of links on social media, and hackers exploit this security gap.&nbsp;</p>
<p>3. Using Phones for Both Personal and Work&nbsp;</p>
<p>As more people use mobile devices for work, they become highly attractive targets for cybercriminals. If a hacker tricks someone into clicking a malicious link, they can easily gain access to sensitive work-related information stored on the phone, as well as take control of the device.&nbsp;</p>
<h2><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20240913020806ZUrmgzi.png"></h2>
<p><span style="font-size: 14pt;"><strong><span style="color: #e03e2d;">The Risk of Phishing Attacks via Remote Control Apps&nbsp;</span></strong></span></p>
<p>In a phishing attack, if a malicious URL is clicked, a remote-control app can be installed, leading to the theft of personal information. While remote-control apps are useful, they can become very dangerous tools when exploited in phishing attacks. Hackers can leverage the nature of these apps to take full control of the victim's device and steal sensitive information. The following are the main reasons why remote support apps are used in mobile phishing attacks:&nbsp;</p>
<p>1. Extensive Device Access Permission&nbsp;</p>
<p>Remote-control apps request access to various functions within the device. They can control the screen in real time, access files, or run applications. These permissions allow hackers to fully control the victim&rsquo;s smartphone and use it to steal sensitive information.&nbsp;</p>
<p>2. User Trust &nbsp;</p>
<p>Remote-control apps are primarily used for technical support, customer service, and IT troubleshooting. Because of this intended purpose, users tend to trust the app and install it without suspicion, granting permissions without hesitation. &nbsp;</p>
<p>3. Real-Time Control and Deception &nbsp;</p>
<p>Since remote-control apps can directly control the mobile device&rsquo;s screen in real-time, an attack can occur without the victim knowing what&rsquo;s happening. Hackers can monitor the victim's actions in real-time and capture sensitive information, such as logging into banking apps or entering confidential data. &nbsp;</p>
<p>4. Evasion of Legal Regulations&nbsp;</p>
<p>Since remote-control apps are typically designed for legitimate and useful purposes, they are less likely to be automatically blocked or detected by security software or the operating system. &nbsp;</p>
<p>5. Easy User Deception&nbsp;</p>
<p>A hacker can easily induce the installation of a remote-control app under the guise of customer service or technical support. &nbsp;</p>
<p>&nbsp;</p>
<p><span style="font-size: 14pt;"><strong><span style="color: #e03e2d;">How to Prevent Phishing Attacks&nbsp;</span></strong></span></p>
<p>To prevent phishing, it is essential for mobile device users to be cautious about their actions. Users should avoid clicking on suspicious URLs and be wary of installing remote-control apps disguised as customer support. However, phishing crimes have recently become more sophisticated, making it difficult for users to always stay alert. In this context, merely detecting remote-control apps can significantly reduce the risk of phishing. Additionally, apps that handle sensitive information, such as banking or financial data, can incorporate remote control app detection features to block app execution or notify users if a remote-control app is installed.&nbsp;</p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20240913020806Bfv9T5d.png"></p>
<p>&nbsp;</p>
<p><span style="font-size: 14pt;"><strong><span style="color: #e03e2d;">How to Use the LISS against Remote-Control Apps&nbsp;</span></strong></span></p>
<p>LISS (LIAPP Secure Screen) is a solution designed to enhance mobile security by providing functions such as remote-control app detection, screen capture prevention, and screen recording blocking in a mobile environment, safeguarding users from various threats that aim to collect personal information.</p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20240913020806QPcZNi4.png" width="869" height="242"></p>
<p>When an app with LISS protected is running, it immediately detects if a remote-control app is running or has been installed. If the detected remote-control app is suspicious, LISS can block it or send a warning message to the user, allowing them to take appropriate action. Additionally, LISS thoroughly prevents illegal screen captures or sharing and recording, protecting users from the threat of data exposure.&nbsp;</p>
<h2><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20240913020806zcqZAO6.png"></h2>
<p>Are you developing a fintech app or an app for financial transactions? If so, it is highly recommended to use LISS, which can detect remote-control apps and protect app users' sensitive data. Financial services handle sensitive user data, and if exposed to security threats, this can lead to financial losses such as customer data breaches, illegal fund transfers, and account takeovers. It can also damage the company&rsquo;s reputation, result in customer loss, attract regulatory sanctions, lawsuits, and in severe cases, cause service disruptions. Phishing attacks that exploit remote- control apps are especially dangerous because they can occur without the user's awareness. &nbsp;</p>
<p>Apps with LISS protected not only detect remote-control apps and notify users, but also block screen captures and recordings in advance, preventing sensitive data from leaking outside. As a result, users can protect their data securely, while companies can maintain trust and minimize financial losses and legal risks associated with security breaches. Additionally, LISS is provided as a library-style SDK, allowing it to be embedded within the app without requiring significant resource investment from the app development team. It can also be applied as a standalone module without needing any additional app installations.&nbsp;</p>
<h2><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20240913020806HSPpZPQ.png"></h2>
<p>Strengthen your app's security with LISS and provide a service that reassures your customers. In an era where security is crucial, LISS is now an essential choice.&nbsp;</p>
<p>&nbsp;</p>
<p>LIAPP, we provide the best service possible.&nbsp;</p>
<div class="text-center mt-10 mb-10"><a class="btn btn-sm btn-liapp mr-2 rounded-full" style="text-decoration: none !important;" href="https://liapp.lockincomp.com/index.php/ja/blog">TECH BLOG</a> <a class="btn btn-sm btn-liapp ml-2 rounded-full" style="text-decoration: none !important;" href="https://liapp.lockincomp.com/index.php/ja/pricing">LIAPP PRICING</a></div>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/40-tech-Prevent-Mobile-Phishing</guid>
	<pubDate>2024-09-12 07:03:37</pubDate>
</item>
          <item>
	<title>Reasons to Use LIKEY (The Most Secured Mobile Keypad)</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/39-tech-Mobile-Secure-Keypad</link>
	<description><![CDATA[<h2>Reasons to Use LIKEY (The Most Secured Mobile Keypad)</h2>
<h2>- Everything I type, they will be delivered to hackers through keylogging</h2>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20240723013743erYX6fR.png" alt="the necessity of a mobile secure keypad" width="650" height="366"></p>
<h2>The Reasons Why Hackers Collect Information Through Mobile Devices&nbsp;</h2>
<p>Information is the most valuable asset in modern society. Some people make money by sharing the information they know, and companies often use it strategically. Depending on how information is managed and protected, a large economic gap can occur. Information is valuable not only to individuals and companies, but also to hackers, as hackers can collect various information from mobile devices and abuse or sell it. Mobile devices are particularly susceptible to attacks because they contain a lot of sensitive data, including financial data, personal information, and corporate information. There are many reasons why hackers steal information from mobile devices, but the main ones include financial reasons, requests from government agencies, cyber warfare, industrial espionage, and resource theft.&nbsp;</p>
<p>&nbsp;</p>
<h3><strong><span style="color: #e03e2d;">The Reasons Why Hackers Collect Information Through Mobile Devices</span></strong></h3>
<div class="SCXW120611641 BCX0">
<div class="ListContainerWrapper SCXW120611641 BCX0">
<p>1. To Gain Financial Information : &nbsp;Hackers obtain direct financial gain by stealing bank and credit card information, or by making fraudulent payments using stolen online payment information.&nbsp;</p>
<p>2. To Collect Personal Information : Hackers steal login credentials to hack accounts and perform phishing attacks, or collect personally identifiable information for identity theft or to sell on black markets.&nbsp;</p>
<p>3. To Collection Corporate Information : Hackers collect sensitive information or customer data within companies to sell or abuse it for competitors, or they infiltrate corporate networks by stealing the login information of employees who have access to important systems.&nbsp;</p>
<p>4. For Political and Social Purposes : Hackers target specific individuals or groups to monitor and suppress their activities and information.&nbsp;</p>
<p>5. For Malicious Activity : Hackers install ransomware to encrypt important files and then demand money, or they lure victims to fraudulent websites.&nbsp;</p>
<p>6. To Sell Information : Hackers sell collected sensitive information on the dark web for financial gain.&nbsp;</p>
<p>&nbsp;</p>
</div>
</div>
<div class="SCXW120611641 BCX0">&nbsp;</div>
<div class="ListContainerWrapper SCXW80118062 BCX0">
<h2>Keylogging, the most effective method for hackers to gather information through mobile devices&nbsp;</h2>
<div class="OutlineElement Ltr SCXW35580653 BCX0">
<p>To a hacker, every character typed on a mobile device can accumulate into a wealth of information about the user. Motivated by various reasons, hackers fundamentally infiltrate mobile systems to obtain valuable resources or information using any means necessary. Among various hacking methods, one highly effective technique for gathering information is keylogging attacks.&nbsp;</p>
<p>Through keylogging attacks, hackers can record every piece of information a user inputs via the keypad. This information can be exploited for various malicious purposes.&nbsp;</p>
<p>Keylogging, short for keystroke logging, refers to the malicious practice of intercepting all data entered by a user via the keypad. Programs designed for this purpose are called keyloggers, and the logs they generate are known as keystroke logs or keystrokes. Keylogging captures all content entered via the keypad without filtering, allowing hackers to access sensitive information such as personal and financial data, account credentials like usernames and passwords, private message conversations, company confidential emails, and more.&nbsp;</p>
<p>On mobile devices, keylogging attacks are broadly categorized into software-based or hardware-based methods.&nbsp;</p>
<p>&nbsp;</p>
</div>
<h3><strong><span style="color: #e03e2d;">1. Mobile Hardware Keylogger&nbsp;</span></strong></h3>
<p>Hardware-based keylogging attacks on mobile devices involve devices like chargers or USB cables that have keylogging functionality. They are typically infected through charging ports in public places. These devices extract and record physical signals, then transmit the logs to hackers. Despite being physical devices, they can be disguised or hidden easily due to similar appearances, making them difficult to detect. Moreover, their detection by antivirus programs is challenging, posing a significant threat.&nbsp;</p>
<p>&nbsp;</p>
<h3><strong><span style="color: #e03e2d;">2. Mobile Software Keylogger</span></strong></h3>
<p>There are methods where malicious apps secretly installed on users' devices record keypad inputs. They are typically distributed through suspicious links. Additionally, legitimate apps may request excessive permissions and could also record keystrokes.&nbsp;</p>
<p>Among these methods, most hackers distribute malware through mobile devices to infect users' phones. Such information-stealing malware continues to evolve in new forms. Attackers often develop them themselves or purchase the latest malware separately on the dark web, sometimes offering them as subscription services. Apart from keylogging, these malicious programs combine various functions such as remote control, webcam hijacking, account information collection, command execution, screenshot capture, and overlay attacks for sale.&nbsp;</p>
<p>Information-stealing malware poses a significant security threat that businesses must also beware of. Several security incidents have shown cases where keylogging malware was discovered on personal computers of company engineers, leading to ongoing theft of corporate information by hackers.&nbsp;</p>
<p>&nbsp;</p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20240723013701MZQBeZV.png" alt="how to prevent mobile keylogging" width="650" height="428"></p>
<p>&nbsp;</p>
<h2>How to prevent Kelogging attacks&nbsp;</h2>
<div class="OutlineElement Ltr SCXW109847395 BCX0">
<div class="OutlineElement Ltr SCXW255871483 BCX0">
<p>Now, you might be wondering, "How can I know if there is a keylogger?" Detecting keyloggers is challenging in itself. Even if unwanted keylogger software or hardware is being used on a mobile device, it is not easy to find. Moreover, detecting keyloggers is like closing the barn door after the horse has bolted, so it is important to take proactive measures to prevent keyloggers from the beginning.&nbsp;</p>
<p>When a mobile app is released, it immediately becomes deeply related to customers' sensitive information. For developers, it is no longer a matter of whether they can develop a mobile app but rather how much responsibility they can bear once the app is out in the world. In this context, the attitude of the app developer to take responsibility for future threats from hackers makes the app more robust.&nbsp;</p>
<p>To prevent mobile keylogging attacks, app developers are recommended to use secure keypads. This is particularly mandated by financial security authorities for fintech and financial apps. Mobile secure keypads are special input tools designed to protect user input from keylogging attacks by utilizing various technologies and methods.&nbsp;</p>
</div>
</div>
<div class="OutlineElement Ltr SCXW109847395 BCX0">
<p class="Paragraph SCXW109847395 BCX0">&nbsp;</p>
<h2>Key Features of Mobile Secure Keypads&nbsp;</h2>
<div class="OutlineElement Ltr SCXW20941926 BCX0">
<h3 class="Paragraph SCXW20941926 BCX0"><strong><span style="color: #e03e2d;">Random Key Layout</span></strong></h3>
</div>
<div class="OutlineElement Ltr SCXW20941926 BCX0">
<p class="Paragraph SCXW20941926 BCX0">Mobile secure keypads randomly arrange the positions of each key. Since the key positions change every time the user inputs data, keyloggers cannot obtain meaningful information even if they record key inputs from specific positions. &nbsp;</p>
</div>
<div class="OutlineElement Ltr SCXW20941926 BCX0">
<p class="Paragraph SCXW20941926 BCX0">&nbsp;</p>
<h3 class="Paragraph SCXW20941926 BCX0"><strong><span style="color: #e03e2d;">Key Input Encryption</span></strong></h3>
</div>
<div class="OutlineElement Ltr SCXW20941926 BCX0">
<p class="Paragraph SCXW20941926 BCX0">This feature encrypts key input data through encryption algorithms before transmission. In this process, even if a keylogger intercepts the data, it is difficult to determine the actual input values.&nbsp;</p>
</div>
<div class="OutlineElement Ltr SCXW20941926 BCX0">&nbsp;&nbsp;</div>
<div class="OutlineElement Ltr SCXW20941926 BCX0">
<h3 class="Paragraph SCXW20941926 BCX0"><strong><span style="color: #e03e2d;">Compliance with the Electronic Financial Transactions Act and Electronic Financial Supervisory Regulations</span></strong></h3>
</div>
<div class="OutlineElement Ltr SCXW20941926 BCX0">To enhance security when using electronic financial services via mobile devices, related regulations such as user authentication and encryption are being strengthened. Therefore, mobile secure keypads must be used to comply with these regulations. In particular, the Financial Security Institute conducts &lsquo;vulnerability checks for fintech services&rsquo; to support the safe operation and use of apps in the fintech industry.&nbsp;</div>
<div class="OutlineElement Ltr SCXW20941926 BCX0">
<p class="Paragraph SCXW20941926 BCX0"><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20240723053748AwbAPfs.png" alt="Assessment of vulnerabilities in fintech services" width="696" height="376"></p>
<p class="Paragraph SCXW20941926 BCX0">To defend against mobile hacking, it is important to fill every possible gap that might allow hackers to achieve their goals, regardless of their motives. However, it is a grave mistake to think that using a secure keypad alone creates an impenetrable fortress against any threat. For thorough app security, the choice of which mobile secure keypad to use also becomes a crucial issue.&nbsp;</p>
<p class="Paragraph SCXW20941926 BCX0">&nbsp;</p>
<h2>Advantages of the LIKEY &nbsp;</h2>
<p class="Paragraph SCXW20941926 BCX0">LIKEY is a new-concept mobile secure keypad designed to address the issues with existing secure keypads' encryption methods and the inconveniences experienced by app developers.&nbsp;</p>
</div>
<div class="OutlineElement Ltr SCXW20941926 BCX0">&nbsp;</div>
<div class="OutlineElement Ltr SCXW20941926 BCX0">
<h3 class="Paragraph SCXW20941926 BCX0"><strong><span style="color: #e03e2d;">Strong Encryption of Input Values</span></strong></h3>
<p>Traditional mobile secure keypads have vulnerabilities because their encryption methods can be deciphered or decrypted based on repeating patterns. In contrast, when entering personal information through LIKEY, different one-time data is generated and transmitted to the server each time. This makes it impossible to decrypt the input information, ensuring personal information is securely protected.&nbsp;</p>
<p>&nbsp;</p>
<h3 class="Paragraph SCXW20941926 BCX0"><strong><span style="color: #e03e2d;">Unique Security Systems for Each Company</span></strong></h3>
<p>LIKEY issues unique identification values for each company or project, enabling the creation of individual security systems. Traditional secure keypads use the same logic and encryption keys across multiple companies, meaning a breach in one company could expose the security of others. However, LIKEY employs individual encryption values for each company and project, allowing the establishment of unique security systems.&nbsp;</p>
<p>&nbsp;</p>
<h3><strong><span style="color: #e03e2d;">Diverse Customizable Designs</span></strong></h3>
<p>You might have seen clunky virtual keypads with uniform grey backgrounds when logging into banking apps. But LIKEY is different. LIKEY is a secure keypad that allows developers to set the desired design and functions. You can customize the color, theme, and button size of the keypad, providing a user-friendly layout. Additionally, you can apply brand colors and logos to the keypad, offering a consistent brand experience. LIKEY is a customizable mobile secure keypad that considers both security and user experience.&nbsp;</p>
<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20240723060040qrwMbRY.png" alt="LIKEY's Colorful and Attractive Custom Keypad UI" width="650" height="253"></p>
<p>Keylogging hacks on mobile apps pose a serious threat to personal privacy and corporate security. Using a robust secure mobile keypad can help mitigate these risks, protecting all your personal and corporate data. As awareness of personal information security has significantly improved recently, more app developers are inquiring about adopting mobile secure keypads. Finally, we conclude this post by answering frequently asked questions about LIKEY.</p>
<p>&nbsp;</p>
<p>Thank you.</p>
<p>&nbsp;</p>
<h2>LIKEY FAQs</h2>
<div class="OutlineElement Ltr SCXW153845232 BCX0">
<p><strong><span style="color: #e03e2d;">Q. Does LIKEY support both Android and iOS?&nbsp;</span></strong></p>
<p>A. Yes, LIKEY supports both AOS and iOS.</p>
<p>&nbsp;</p>
<p><strong><span style="color: #e03e2d;">Q. How does LIKEY work? Do you provide any libraries?&nbsp;</span></strong></p>
<p>A. LIKEY will provide SDK as library form.</p>
<p>&nbsp;</p>
<p><strong><span style="color: #e03e2d;">Q. What is the minimum supported version of LKEY for AOS and iOS respectively?&nbsp;</span></strong></p>
<p>A. LIKEY supports Android 4.1 or higher and iOS 7.0 or higher.</p>
</div>
<div class="OutlineElement Ltr SCXW153845232 BCX0">
<p class="Paragraph SCXW153845232 BCX0"><span class="EOP SCXW153845232 BCX0" data-ccp-props="{">&nbsp;</span></p>
</div>
<div class="OutlineElement Ltr SCXW153845232 BCX0">
<p class="Paragraph SCXW153845232 BCX0">&nbsp;</p>
</div>
</div>
</div>
</div>
<p>LIAPP, we provicde the best service possible.</p>
<p>&nbsp;</p>
<div class="text-center mt-10 mb-10"><a class="btn btn-sm btn-liapp mr-2 rounded-full" style="text-decoration: none !important;" href="https://liapp.lockincomp.com/index.php/ja/blog">TECH BLOG</a> <a class="btn btn-sm btn-liapp ml-2 rounded-full" style="text-decoration: none !important;" href="https://liapp.lockincomp.com/index.php/ja/pricing">LIAPP PRICING</a></div>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/39-tech-Mobile-Secure-Keypad</guid>
	<pubDate>2024-07-23 01:38:10</pubDate>
</item>
          <item>
	<title>OWASP Mobile Top 10 2024 – Guide to Addressing the Most Critical Vulnerabilities for Mobile App Security</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/36-tech-OWASP-Top-10</link>
	<description><![CDATA[<p><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20240522024808QNWvHPn.png" alt="OWASP mobile top 10 risks" width="650" height="366"></p>
<p>&nbsp;</p>
<h2>OWASP Mobile Top 10 2024 &ndash; Guide to Addressing the Most Critical Vulnerabilities for Mobile App Security</h2>
<p>&nbsp;</p>
<div class="OutlineElement Ltr SCXW172585352 BCX0">
<p class="Paragraph SCXW172585352 BCX0"><span class="TextRun SCXW172585352 BCX0" lang="KO-KR" xml:lang="KO-KR" data-contrast="auto"><span class="NormalTextRun SCXW172585352 BCX0">Intuitive features and sleek interfaces of mobile apps are essential for providing a high user experience and maximizing the revenue of developers. However, behind the flashy features and design, users' personal information can be easily exposed. While successful app launches and continuous operation are important, improving security is also a crucial resource for both the developers and users of the app.&nbsp;</span></span><span class="EOP SCXW172585352 BCX0" data-ccp-props="{">&nbsp;</span></p>
</div>
<div class="OutlineElement Ltr SCXW172585352 BCX0">
<p class="Paragraph SCXW172585352 BCX0">However, a poor approach to security can lead to disastrous consequences. If incorrect mobile security is applied to an application, users may lose trust in the business. To address this, a worldwide not-for-profit organization Open Worldwide Application Security Project(OWASP) provides various free open-source tools, documents, and resources to help organizations strengthen their security posture. One of the most well-known projects is the OWASP Top Mobile 10, which plays a crucial role in raising awareness about application security risks.</p>
</div>
<div class="OutlineElement Ltr SCXW172585352 BCX0">
<p class="Paragraph SCXW172585352 BCX0">Below are the top 10 mobile application vulnerabilities newly announced by OWASP in 2024.</p>
<p class="Paragraph SCXW172585352 BCX0">&nbsp;</p>
<div class="OutlineElement Ltr SCXW19080694 BCX0">
<h2 class="Paragraph SCXW19080694 BCX0"><span style="color: #e03e2d;"><span class="TextRun SCXW19080694 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">OWASP Mobile Top 10 2024</span></span><span class="EOP SCXW19080694 BCX0" data-ccp-props="{">&nbsp;</span></span></h2>
</div>
<div class="OutlineElement Ltr SCXW19080694 BCX0">
<p class="Paragraph SCXW19080694 BCX0"><span class="TextRun SCXW19080694 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">M1: Improper Credential Usage</span></span></p>
</div>
<div class="OutlineElement Ltr SCXW19080694 BCX0">
<p class="Paragraph SCXW19080694 BCX0"><span class="TextRun SCXW19080694 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">M2: Inadequate Supply Chain Security</span></span><span class="TextRun SCXW19080694 BCX0" lang="KO-KR" xml:lang="KO-KR" data-contrast="auto">&nbsp;</span></p>
</div>
<div class="OutlineElement Ltr SCXW19080694 BCX0">
<p class="Paragraph SCXW19080694 BCX0"><span class="TextRun SCXW19080694 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">M3: Insecure Authentication/Authorization</span></span></p>
</div>
<div class="OutlineElement Ltr SCXW19080694 BCX0">
<p class="Paragraph SCXW19080694 BCX0"><span class="TextRun SCXW19080694 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">M4: Insufficient Input/Output Validation</span></span></p>
</div>
<div class="OutlineElement Ltr SCXW19080694 BCX0">
<p class="Paragraph SCXW19080694 BCX0"><span class="TextRun SCXW19080694 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">M5: Insecure Communication</span></span><span class="TextRun SCXW19080694 BCX0" lang="KO-KR" xml:lang="KO-KR" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">&nbsp;</span></span></p>
</div>
<div class="OutlineElement Ltr SCXW19080694 BCX0">
<p class="Paragraph SCXW19080694 BCX0"><span class="TextRun SCXW19080694 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">M6: Inadequate Privacy Controls</span></span><span class="TextRun SCXW19080694 BCX0" lang="KO-KR" xml:lang="KO-KR" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">&nbsp;</span></span></p>
</div>
<div class="OutlineElement Ltr SCXW19080694 BCX0">
<p class="Paragraph SCXW19080694 BCX0"><span class="TextRun SCXW19080694 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">M7: Insufficient Binary Protections</span></span><span class="TextRun SCXW19080694 BCX0" lang="KO-KR" xml:lang="KO-KR" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">&nbsp;</span></span></p>
</div>
<div class="OutlineElement Ltr SCXW19080694 BCX0">
<p class="Paragraph SCXW19080694 BCX0"><span class="TextRun SCXW19080694 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">M8: Security Misconfiguration</span></span><span class="TextRun SCXW19080694 BCX0" lang="KO-KR" xml:lang="KO-KR" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">&nbsp;</span></span></p>
</div>
<div class="OutlineElement Ltr SCXW19080694 BCX0">
<p class="Paragraph SCXW19080694 BCX0"><span class="TextRun SCXW19080694 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">M9: Insecure Data Storage</span></span><span class="TextRun SCXW19080694 BCX0" lang="KO-KR" xml:lang="KO-KR" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">&nbsp;</span></span></p>
</div>
<div class="OutlineElement Ltr SCXW19080694 BCX0">
<p class="Paragraph SCXW19080694 BCX0"><span class="TextRun SCXW19080694 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">M10: Insufficient Cryptography</span></span><span class="TextRun SCXW19080694 BCX0" lang="KO-KR" xml:lang="KO-KR" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">&nbsp;</span></span></p>
<p class="Paragraph SCXW19080694 BCX0">&nbsp;</p>
<p class="Paragraph SCXW19080694 BCX0">Then, let's have a detailed look of OWASP Mobile Top 10 2024.</p>
<p class="Paragraph SCXW19080694 BCX0">(This is extracted from https://owasp.org/www-project-mobile-top-10/)</p>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<h2 class="Paragraph SCXW41000404 BCX0"><span style="color: #e03e2d;"><span class="TextRun SCXW41000404 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW41000404 BCX0">1. <span class="TextRun SCXW19080694 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">Improper Credential Usage</span></span></span></span><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">&nbsp;</span></span></h2>
</div>
<div class="SCXW41000404 BCX0">
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<p class="Paragraph SCXW41000404 BCX0">Code and scripts written by developers often require credentials (such as SSH keys and API tokens) and passwords to access various resources and interact with other applications and tools. To save time, developers frequently include sensitive information in the code. When such credentials are hard-coded, critical information is exposed to anyone who has access to this code.</p>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<p class="Paragraph SCXW41000404 BCX0">To manage credentials securely, hard-coded credentials should not be used, and the following management measures are necessary.</p>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<h3 class="Paragraph SCXW41000404 BCX0"><em><span class="TextRun SCXW41000404 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">&nbsp;</span></span></em></h3>
<h3 class="Paragraph SCXW41000404 BCX0"><em><span class="TextRun SCXW41000404 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">-Proper Measures</span></span></em></h3>
</div>
<div class="ListContainerWrapper SCXW41000404 BCX0">
<ul class="BulletListStyle1 SCXW41000404 BCX0" role="list">
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="5" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* Encrypt credentials during transmission.</p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="5" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* Do not store user credentials on the device. Instead, consider using secure, revocable access tokens.</p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="5" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* Implement strong user authentication protocols.</p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="5" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* Regularly update and rotate any used API keys or tokens.</p>
</li>
</ul>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<p class="Paragraph SCXW41000404 BCX0"><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">&nbsp;</span></p>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<h2 class="Paragraph SCXW41000404 BCX0"><span style="color: #e03e2d;"><span class="TextRun SCXW41000404 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW41000404 BCX0">2. <span class="TextRun SCXW19080694 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">Inadequate Supply Chain Security</span></span></span></span><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">&nbsp;</span></span></h2>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<p class="Paragraph SCXW41000404 BCX0">If the mobile app supply chain is vulnerable, hackers can insert malicious code into the codebase or modify code during the build process to insert backdoors, spyware, or other malware, allowing them to steal data, monitor users, or control mobile devices.</p>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<p class="Paragraph SCXW41000404 BCX0">These threats particularly arise when using mobile apps developed by third parties or relying on third-party libraries and components. If app developers do not properly inspect or update third-party components, they can be vulnerable to such attacks.</p>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<h3 class="Paragraph SCXW41000404 BCX0">&nbsp;</h3>
<h3 class="Paragraph SCXW41000404 BCX0"><em><span class="TextRun SCXW41000404 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">-Proper Measures</span></span></em></h3>
</div>
<div class="ListContainerWrapper SCXW41000404 BCX0">
<ul class="BulletListStyle1 SCXW41000404 BCX0" role="list">
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* Implement secure coding practices, code review, and testing throughout the mobile app development lifecycle to identify and mitigate vulnerabilities.</p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="6" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* Ensure secure app signing and distribution processes to prevent attackers from signing and distributing malicious code.</p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="7" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* Use only trusted and validated third-party libraries or components to reduce the risk of vulnerabilities.</p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="8" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* Establish security controls for app updates, patches, and releases to prevent attackers from exploiting vulnerabilities in the app.</p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="9" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* Monitor and detect supply chain security incidents through security testing, scanning, or other techniques to detect and respond to incidents in a timely manner.</p>
</li>
</ul>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<p class="Paragraph SCXW41000404 BCX0"><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">&nbsp;</span></p>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<h2 class="Paragraph SCXW41000404 BCX0"><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">&nbsp;</span><span style="color: #e03e2d;"><span class="TextRun SCXW41000404 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW41000404 BCX0">3. <span class="TextRun SCXW19080694 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">Insecure Authentication/Authorization</span></span></span></span></span></h2>
</div>
</div>
<div class="SCXW41000404 BCX0">
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<p class="Paragraph SCXW41000404 BCX0">Hackers can exploit vulnerabilities in authentication or authorization systems to forge or bypass authentication in mobile apps. If the authentication system is flawed or missing, attackers can execute mobile functions anonymously from the backend server. When user identities cannot be verified, the attack source cannot be detected, exposing the risk directly.</p>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<p class="Paragraph SCXW41000404 BCX0">To evaluate mobile app security, it's crucial to understand the difference between authentication and authorization. Authentication identifies individuals, while authorization verifies whether they have the necessary permissions for specific actions. The following are examples of insecure authentication and authorization in mobile apps.</p>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<h3 class="Paragraph SCXW41000404 BCX0">&nbsp;</h3>
<h3 class="Paragraph SCXW41000404 BCX0"><em><span class="TextRun SCXW41000404 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">-Insecure Authentication</span></span></em></h3>
</div>
<div class="ListContainerWrapper SCXW41000404 BCX0">
<ul class="BulletListStyle1 SCXW41000404 BCX0" role="list">
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* Anonymous Backend API Execution</p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* Local Storage of Passwords or Shared Secrets</p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* Weak Password Policy</p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* Usage of Features like FaceID and TouchID</p>
</li>
</ul>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<h3 class="Paragraph SCXW41000404 BCX0">&nbsp;</h3>
<h3 class="Paragraph SCXW41000404 BCX0"><em><span class="TextRun SCXW41000404 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">-Insecure Authorization</span></span></em></h3>
</div>
<div class="ListContainerWrapper SCXW41000404 BCX0">
<ul class="BulletListStyle1 SCXW41000404 BCX0" role="list">
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* Presence of Insecure Direct Object Reference (IDOR) vulnerabilities</p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="6" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0" lang="KO-KR" xml:lang="KO-KR">* Hidden Endpoints</p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="7" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0"><span class="TextRun SCXW41000404 BCX0" lang="KO-KR" xml:lang="KO-KR" data-contrast="auto"><span class="NormalTextRun SCXW41000404 BCX0">* When the app transmits user roles and permissions to the backend system</span></span></p>
</li>
</ul>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<h3 class="Paragraph SCXW41000404 BCX0">&nbsp;</h3>
<h3 class="Paragraph SCXW41000404 BCX0"><em><span class="TextRun SCXW41000404 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">-Proper Measures</span></span></em></h3>
</div>
<div class="ListContainerWrapper SCXW41000404 BCX0">
<ul class="BulletListStyle1 SCXW41000404 BCX0" role="list">
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="8" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* When migrating a web application to mobile, authentication requirements must align.</p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="9" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0"><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">* All authentication requests should ideally be handled on the server side.&nbsp;</span></p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="10" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* If client-side data storage is necessary, encrypt the data using securely derived encryption keys from the user's login credentials.&nbsp;</p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="11" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* Users should be encouraged not to store passwords on their devices.</p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="12" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* Authentication and authorization control should be strengthened on the server side.</p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="13" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* When performing local authentication or authorization checks in an offline environment, local integrity checks should be conducted to detect unauthorized code alterations.</p>
</li>
</ul>
</div>
</div>
<div class="SCXW41000404 BCX0">
<div class="ListContainerWrapper SCXW41000404 BCX0">
<ul class="BulletListStyle1 SCXW41000404 BCX0" role="list">
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* The backend system should independently verify the permissions and approvals of authenticated users. Additionally, assuming that all client-side authentication can be bypassed, reinforce server-side authentication and authorization activities whenever possible.</p>
</li>
</ul>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<p class="Paragraph SCXW41000404 BCX0"><span class="TextRun SCXW41000404 BCX0" lang="KO-KR" xml:lang="KO-KR" data-contrast="auto"><span class="NormalTextRun SCXW41000404 BCX0">&nbsp;</span><span class="NormalTextRun SCXW41000404 BCX0">&nbsp;</span></span><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">&nbsp;</span></p>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<h2 class="Paragraph SCXW41000404 BCX0"><span style="color: #e03e2d;"><span class="TextRun SCXW41000404 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW41000404 BCX0">4. <span class="TextRun SCXW19080694 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">Insufficient Input/Output Validation</span></span></span></span><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">&nbsp;</span></span></h2>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<p class="Paragraph SCXW41000404 BCX0"><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">If mobile apps fail to properly validate data from external sources such as user input or network data, they may be vulnerable to attacks specialized for the mobile environment, such as SQL injection, command injection, and XSS attacks. Hackers can gain access to the system and execute unauthorized code within the app or extract data without permission, potentially gaining control over app features and the entire mobile system.&nbsp;</span></p>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<h3 class="Paragraph SCXW41000404 BCX0">&nbsp;</h3>
<h3 class="Paragraph SCXW41000404 BCX0"><em><span class="TextRun SCXW41000404 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">-Proper Measures</span></span></em></h3>
</div>
<div class="ListContainerWrapper SCXW41000404 BCX0">
<ul class="BulletListStyle1 SCXW41000404 BCX0" role="list">
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* Input Validation: Validate and sanitize user input using strict validation techniques. Implement input length restrictions and reject unexpected or malicious data.</p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* Output Sanitization: Properly sanitize output data to prevent cross-site scripting (XSS) attacks. Use output encoding techniques when displaying or transmitting data.</p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0" lang="KO-KR" xml:lang="KO-KR">* Context-Specific Validation: Perform specific validation based on data context (e.g., file uploads, database queries) to prevent attacks like path traversal or injection.</p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1">
<div class="group/conversation-turn relative flex w-full min-w-0 flex-col agent-turn">
<div class="flex-col gap-1 md:gap-3">
<div class="flex flex-grow flex-col max-w-full">
<div class="min-h-[20px] text-message flex flex-col items-start whitespace-pre-wrap break-words [.text-message+&amp;]:mt-5 juice:w-full juice:items-end overflow-x-auto gap-2" dir="auto" data-message-author-role="assistant" data-message-id="2a9f4ecc-4fd5-46af-a5ff-a4ac748c4d42">
<div class="flex w-full flex-col gap-1 juice:empty:hidden juice:first:pt-[3px]">
<div class="markdown prose w-full break-words dark:prose-invert light">
<p>* Data Integrity Checks: Implement data integrity checks to detect and prevent data corruption or unauthorized modifications.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="6" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0"><span class="LineBreakBlob BlobObject DragDrop SCXW41000404 BCX0">* Secure Coding Practices: Follow secure coding practices, such as using parameterized queries and prepared statements to prevent SQL injection.</span><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">&nbsp;</span></p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="6" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="7" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* Regular Security Testing: Conduct regular security assessments, including penetration testing and code reviews, to identify and address vulnerabilities.</p>
</li>
</ul>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<p class="Paragraph SCXW41000404 BCX0"><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">&nbsp;</span></p>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<h2 class="Paragraph SCXW41000404 BCX0"><span style="color: #e03e2d;"><span class="TextRun SCXW41000404 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW41000404 BCX0">5. <span class="TextRun SCXW19080694 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">Insecure Communication</span></span></span></span></span></h2>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<p class="Paragraph SCXW41000404 BCX0">Mobile apps exchange data with one or more remote servers. Typically, mobile devices utilize various communication technologies such as TCP/IP, WiFi, Bluetooth/Bluetooth-LE, NFC, audio, infrared, GSM, 3G, SMS, etc., to transmit data. However, if the local network is compromised or if malicious code is inserted into network devices or mobile devices, it can lead to various damages such as account hijacking, identity theft, leakage of Personally Identifiable Information (PII), etc.</p>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<p class="Paragraph SCXW41000404 BCX0"><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">One particularly noticeable feature is the exchange of sensitive data (encryption keys, passwords, personal user information, account details, session tokens, documents, metadata, binaries, etc.) packaged for interchange between devices. In such cases, there's a risk of some data being intercepted.&nbsp;</span></p>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<h3 class="Paragraph SCXW41000404 BCX0">&nbsp;</h3>
<h3 class="Paragraph SCXW41000404 BCX0"><em><span class="TextRun SCXW41000404 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">-Proper Measures</span></span></em></h3>
</div>
<div class="ListContainerWrapper SCXW41000404 BCX0">
<ul class="BulletListStyle1 SCXW41000404 BCX0" role="list">
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="8" data-aria-level="1">
<div class="flex flex-grow flex-col max-w-full">
<div class="min-h-[20px] text-message flex flex-col items-start whitespace-pre-wrap break-words [.text-message+&amp;]:mt-5 juice:w-full juice:items-end overflow-x-auto gap-2" dir="auto" data-message-author-role="assistant" data-message-id="fda4ca1d-66c4-45bf-8599-c23f2d71fb9f">
<div class="flex w-full flex-col gap-1 juice:empty:hidden juice:first:pt-[3px]">
<div class="markdown prose w-full break-words dark:prose-invert light">
<p>* Apply SSL/TLS to the backend API or web service data transmission channels in the mobile app. When the application executes routines through a browser/webkit, it describes external entities such as third-party analytics companies, social networks, etc., using SSL versions. Avoid mixed SSL sessions as they could expose the user's session ID.</p>
</div>
</div>
</div>
</div>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="9" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* Use industry-standard encryption products with appropriate key lengths. Use certificates signed by trusted CA providers and do not accept invalid certificates (self-signed, expired, untrusted roots, revoked, incorrect hosts, etc.).</p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="10" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* Do not transmit sensitive data through alternative channels (e.g., SMS, MMS, or notifications). If possible, apply an additional encryption layer before sensitive data is provided over the SSL channel. In the event vulnerabilities are discovered in future SSL implementations, encrypted data serves as a secondary defense against confidentiality breaches. During the development cycle, instead of redefining SSL verification methods to allow untrusted certificates, use self-signed certificates or a local development certification authority (CA).</p>
</li>
</ul>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<p class="Paragraph SCXW41000404 BCX0"><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">&nbsp;</span></p>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<h2 class="Paragraph SCXW41000404 BCX0"><span style="color: #e03e2d;"><span class="TextRun SCXW41000404 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW41000404 BCX0">6. <span class="TextRun SCXW19080694 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">Inadequate Privacy Controls</span></span></span></span></span></h2>
</div>
</div>
<div class="SCXW41000404 BCX0">
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<p class="Paragraph SCXW41000404 BCX0"><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">Protecting Personally Identifiable Information (PII) involves safeguarding information such as names, addresses, credit card details, emails and IP addresses, as well as information on health, religion, sexual preferences, and political opinions. Hackers exploit this information to impersonate victims for fraud, misuse payment data, threaten victims with sensitive information, or destroy or manipulate important victim data. To obtain PII, hackers must first breach other levels of security such as networks, file systems, or log access.&nbsp;</span></p>
</div>
<div class="OutlineElement Ltr SCXW41000404 BCX0">
<h3 class="Paragraph SCXW41000404 BCX0">&nbsp;</h3>
<h3 class="Paragraph SCXW41000404 BCX0"><em><span class="TextRun SCXW41000404 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">-Proper Measures</span></span></em></h3>
</div>
<div class="ListContainerWrapper SCXW41000404 BCX0">
<ul class="BulletListStyle1 SCXW41000404 BCX0" role="list">
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* Minimize the PII being processed.</p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0">* Do not store or transmit PII unless absolutely necessary.</p>
</li>
<li class="OutlineElement Ltr SCXW41000404 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1">
<p class="Paragraph SCXW41000404 BCX0"><span class="TextRun SCXW41000404 BCX0" lang="KO-KR" xml:lang="KO-KR" data-contrast="auto"><span class="NormalTextRun SCXW41000404 BCX0">* Important data is protected through appropriate authentication and authorization.</span></span></p>
</li>
</ul>
<p>&nbsp;</p>
<p><span class="EOP SCXW41000404 BCX0" data-ccp-props="{"><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20240522031535HlsWakm.png" alt="불충분한 개인 정보 보호 제어" width="650" height="650"></span></p>
<div class="OutlineElement Ltr SCXW147974383 BCX0">
<h2 class="Paragraph SCXW147974383 BCX0"><span style="color: #e03e2d;"><span class="TextRun SCXW147974383 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW147974383 BCX0">7. <span class="TextRun SCXW19080694 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">Insufficient Binary Protections</span></span><span class="TextRun SCXW19080694 BCX0" lang="KO-KR" xml:lang="KO-KR" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">&nbsp;</span></span></span></span><span class="EOP SCXW147974383 BCX0" data-ccp-props="{">&nbsp;</span></span></h2>
</div>
<div class="OutlineElement Ltr SCXW147974383 BCX0">
<p class="Paragraph SCXW147974383 BCX0">App binaries may contain critical information such as commercial API keys or hard-coded encryption secrets. Additionally, the code within the binary may hold significant value on its own due to containing important business logic or pre-trained AI models. Hackers can manipulate the app binary not only for information gathering but also to gain free access to paid features or, in the worst-case scenario, modify popular apps to redistribute them as apps containing malicious code.</p>
</div>
<div class="OutlineElement Ltr SCXW147974383 BCX0">
<p class="Paragraph SCXW147974383 BCX0">All apps are vulnerable to binary attacks. Binary attacks become particularly severe if the binary contains sensitive data or algorithms hardcoded within it, or if the app is highly popular. While obfuscation, encrypted encoding of native code (on Android), or similar measures can protect the app, they are never foolproof defenses.</p>
</div>
<div class="OutlineElement Ltr SCXW147974383 BCX0">
<h3 class="Paragraph SCXW41000404 BCX0">&nbsp;</h3>
<h3 class="Paragraph SCXW41000404 BCX0"><em><span class="TextRun SCXW41000404 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">-Proper Measures</span></span></em></h3>
</div>
<div class="ListContainerWrapper SCXW147974383 BCX0">
<ul class="BulletListStyle1 SCXW147974383 BCX0" role="list">
<li class="OutlineElement Ltr SCXW147974383 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1">
<p class="Paragraph SCXW147974383 BCX0"><span class="TextRun SCXW147974383 BCX0" lang="KO-KR" xml:lang="KO-KR" data-contrast="auto"><span class="NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW147974383 BCX0">* Reverse engineering :</span><span class="NormalTextRun SCXW147974383 BCX0"> To prevent reverse engineering, attackers must be unable to understand the app binary. This can be addressed by employing code obfuscation and code encryption techniques.</span></span></p>
</li>
<li class="OutlineElement Ltr SCXW147974383 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1">
<p class="Paragraph SCXW147974383 BCX0"><span class="TextRun SCXW147974383 BCX0" lang="KO-KR" xml:lang="KO-KR" data-contrast="auto"><span class="NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW147974383 BCX0">* Breaking security mechanisms :</span><span class="NormalTextRun SCXW147974383 BCX0"> Hackers need to understand the overall flow of app control to bypass security checks. Therefore, encryption and obfuscation can be highly beneficial. Additionally, local security checks should be reinforced on the backend. For example, resources required for protected functions should only be downloaded if verified locally and on the backend. Finally, integrity checks detect code tampering and detect app redistribution and modifications.</span></span></p>
</li>
</ul>
<p>&nbsp;</p>
<div class="SCXW72051551 BCX0">
<div class="OutlineElement Ltr SCXW72051551 BCX0">
<h2 class="Paragraph SCXW72051551 BCX0"><span style="color: #e03e2d;"><span class="TextRun SCXW72051551 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW72051551 BCX0">8. <span class="TextRun SCXW19080694 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">Security Misconfiguration</span></span></span></span></span></h2>
</div>
<div class="OutlineElement Ltr SCXW72051551 BCX0">
<p class="Paragraph SCXW72051551 BCX0">It refers to the improper configuration of security settings, permissions, and controls in mobile apps that can lead to unauthorized access. For example, using default configurations without reviewing security settings, permissions, and default credentials, or using unencrypted communication channels, neglecting security updates or patches, insecure file provider path settings, and more.</p>
</div>
<div class="OutlineElement Ltr SCXW72051551 BCX0">
<h3 class="Paragraph SCXW41000404 BCX0">&nbsp;</h3>
<h3 class="Paragraph SCXW41000404 BCX0"><em><span class="TextRun SCXW41000404 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">-Proper Measures</span></span></em></h3>
</div>
<div class="ListContainerWrapper SCXW72051551 BCX0">
<ul class="BulletListStyle1 SCXW72051551 BCX0" role="list">
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="6" data-aria-level="1">
<p class="Paragraph SCXW72051551 BCX0">* Secure default configurations: Ensure that default settings and configurations are properly secured and do not expose sensitive information or provide unnecessary permissions.</p>
</li>
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="7" data-aria-level="1">
<p class="Paragraph SCXW72051551 BCX0">* Default credentials: Refrain from using hardcoded default credentials.</p>
</li>
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="8" data-aria-level="1">
<p class="Paragraph SCXW72051551 BCX0">* Insecure permissions: Avoid storing application files with overly permissive permissions like world-readable and/or world-writable.</p>
</li>
</ul>
</div>
</div>
<div class="SCXW72051551 BCX0">
<div class="ListContainerWrapper SCXW72051551 BCX0">
<ul class="BulletListStyle1 SCXW72051551 BCX0" role="list">
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1">
<p class="Paragraph SCXW72051551 BCX0">* Least privilege principle: Request only the permissions necessary for the proper functioning of the application.</p>
</li>
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1">
<div class="group/conversation-turn relative flex w-full min-w-0 flex-col agent-turn">
<div class="flex-col gap-1 md:gap-3">
<div class="flex flex-grow flex-col max-w-full">
<div class="min-h-[20px] text-message flex flex-col items-start whitespace-pre-wrap break-words [.text-message+&amp;]:mt-5 juice:w-full juice:items-end overflow-x-auto gap-2" dir="auto" data-message-author-role="assistant" data-message-id="b30c839a-cbbc-4e56-af32-0bdaeb31bbfc">
<div class="flex w-full flex-col gap-1 juice:empty:hidden juice:first:pt-[3px]">
<div class="markdown prose w-full break-words dark:prose-invert light">
<p>* Secure network configuration: Disallow cleartext traffic and use certificate pinning when possible.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</li>
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1">
<p class="Paragraph SCXW72051551 BCX0">* Disable Debugging: Disable debugging features in the production version of the app.</p>
</li>
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1">* Disable backup mode (Android): By disabling backup mode on Android devices, you prevent the inclusion of app data in the device&rsquo;s backup, ensuring that sensitive data from the app is not stored in the device backup.</li>
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1">* Limit application attack surface by only exporting activities, content providers and services that are necessary to be exported.</li>
</ul>
</div>
<div class="OutlineElement Ltr SCXW72051551 BCX0">
<p class="Paragraph SCXW72051551 BCX0"><span class="EOP SCXW72051551 BCX0" data-ccp-props="{">&nbsp;</span></p>
</div>
<div class="OutlineElement Ltr SCXW72051551 BCX0">
<h2 class="Paragraph SCXW72051551 BCX0"><span style="color: #e03e2d;"><span class="TextRun SCXW72051551 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW72051551 BCX0">9. <span class="TextRun SCXW19080694 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">Insecure Data Storage</span></span><span class="TextRun SCXW19080694 BCX0" lang="KO-KR" xml:lang="KO-KR" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">&nbsp;</span></span></span></span><span class="EOP SCXW72051551 BCX0" data-ccp-props="{">&nbsp;</span></span></h2>
</div>
<div class="OutlineElement Ltr SCXW72051551 BCX0">
<p class="Paragraph SCXW72051551 BCX0">If data isn't securely stored, it becomes exposed to various attacks from hackers, ranging from direct data extraction to intercepting sensitive information. Therefore, encryption, secure transmission protocols, and thorough security measures are essential to prevent hackers from easily accessing sensitive data.</p>
</div>
<div class="OutlineElement Ltr SCXW72051551 BCX0">
<h3 class="Paragraph SCXW72051551 BCX0">&nbsp;</h3>
<h3 class="Paragraph SCXW72051551 BCX0"><span class="TextRun SCXW72051551 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><em><span class="NormalTextRun SCXW72051551 BCX0"><span class="NormalTextRun SCXW72051551 BCX0">-Insecure Data Storage</span></span></em><span class="EOP SCXW72051551 BCX0" data-ccp-props="{">&nbsp;</span></span></h3>
</div>
<div class="ListContainerWrapper SCXW72051551 BCX0">
<ul class="BulletListStyle1 SCXW72051551 BCX0" role="list">
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1">
<p class="Paragraph SCXW72051551 BCX0">* Lack of Access Controls</p>
</li>
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1">
<p class="Paragraph SCXW72051551 BCX0"><span class="EOP SCXW72051551 BCX0" data-ccp-props="{">* Inadequate Encryption&nbsp;</span></p>
</li>
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="6" data-aria-level="1">
<p class="Paragraph SCXW72051551 BCX0">* Unintentional Data Exposure</p>
</li>
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="7" data-aria-level="1">
<p class="Paragraph SCXW72051551 BCX0">* Poor Session Management</p>
</li>
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="8" data-aria-level="1">
<p class="Paragraph SCXW72051551 BCX0">* Insufficient Input Validation</p>
</li>
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="9" data-aria-level="1">
<p class="Paragraph SCXW72051551 BCX0">* Cloud Storage Misconfigurations</p>
</li>
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="10" data-aria-level="1">
<p class="Paragraph SCXW72051551 BCX0">* Third-Party Library Vulnerabilities</p>
</li>
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="11" data-aria-level="1">
<p class="Paragraph SCXW72051551 BCX0">* Unintended Data Sharing</p>
</li>
</ul>
</div>
<div class="OutlineElement Ltr SCXW72051551 BCX0">
<h3 class="Paragraph SCXW41000404 BCX0">&nbsp;</h3>
<h3 class="Paragraph SCXW41000404 BCX0"><em><span class="TextRun SCXW41000404 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">-Proper Measures</span></span></em></h3>
</div>
<div class="ListContainerWrapper SCXW72051551 BCX0">
<ul class="BulletListStyle1 SCXW72051551 BCX0" role="list">
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="12" data-aria-level="1">
<p class="Paragraph SCXW72051551 BCX0">* Use Strong Encryption : Implement robust encryption algorithms and practices to protect sensitive data both at rest and in transit. Utilise industry-standard encryption algorithms and ensure that encryption keys are securely stored and managed.</p>
</li>
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="13" data-aria-level="1">
<p class="Paragraph SCXW72051551 BCX0">* Secure Data Transmission: Utilise secure communication protocols (e.g., HTTPS, SSL/TLS) to protect data during transmission between the mobile application and backend servers. Avoid sending sensitive data over unsecured channels.</p>
</li>
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="14" data-aria-level="1">
<p class="Paragraph SCXW72051551 BCX0">* Implement Secure Storage Mechanisms: Store sensitive data in secure storage locations that are inaccessible to unauthorised users. Use platform-specific secure storage mechanisms provided by the mobile operating system, such as Keychain (iOS) or Keystore (Android).</p>
</li>
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="15" data-aria-level="1">
<p class="Paragraph SCXW72051551 BCX0">* Employ Proper Access Controls: Implement strong access controls to restrict unauthorised access to sensitive data. Authenticate users securely, enforce role-based access controls, and validate user permissions before granting access to sensitive information.</p>
</li>
</ul>
</div>
</div>
<div class="SCXW72051551 BCX0">
<div class="ListContainerWrapper SCXW72051551 BCX0">
<ul class="BulletListStyle1 SCXW72051551 BCX0" role="list">
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1">
<p class="Paragraph SCXW72051551 BCX0">* Validate Input and Sanitize Data: Implement input validation and data sanitization techniques to prevent injection attacks and ensure that only valid and expected data is stored. Validate user inputs to mitigate the risk of malicious code injection or unintended data leakage.</p>
</li>
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1">
<p class="Paragraph SCXW72051551 BCX0">* Apply Secure Session Management: Implement secure session management techniques, such as using randomly generated session tokens, setting proper session timeouts, and securely storing session data on the client and server sides.</p>
</li>
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1">
<p class="Paragraph SCXW72051551 BCX0">* Regularly Update and Patch Dependencies: Keep all libraries, frameworks, and third-party dependencies up to date, as they may contain security vulnerabilities that could lead to insecure data storage. Regularly apply security patches and updates provided by the respective vendors.</p>
</li>
<li class="OutlineElement Ltr SCXW72051551 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1">* Stay Informed: Stay up to date with the latest security threats and vulnerabilities in the mobile application landscape. Monitor security forums, security advisories, and mobile platform updates to ensure timely mitigation of emerging risks.</li>
</ul>
</div>
</div>
</div>
<p>&nbsp;</p>
<p><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20240522044445iCTPTj5.png" alt="안전하지 않은 데이터 저장" width="650" height="650"></p>
<p>&nbsp;</p>
<div class="SCXW31021429 BCX0">
<div class="OutlineElement Ltr SCXW31021429 BCX0">
<h2 class="Paragraph SCXW31021429 BCX0"><span style="color: #e03e2d;"><span class="TextRun SCXW31021429 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW31021429 BCX0">10. <span class="TextRun SCXW19080694 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">Insufficient Cryptography</span></span><span class="TextRun SCXW19080694 BCX0" lang="KO-KR" xml:lang="KO-KR" data-contrast="auto"><span class="NormalTextRun SCXW19080694 BCX0">&nbsp;</span></span></span></span><span class="EOP SCXW31021429 BCX0" data-ccp-props="{">&nbsp;</span></span></h2>
</div>
<div class="OutlineElement Ltr SCXW31021429 BCX0">
<p class="Paragraph SCXW31021429 BCX0">Lack of sufficient encryption can result in data breaches, unauthorized access to user accounts, compromise of confidentiality, or data falsification or alteration.&nbsp;</p>
</div>
<div class="OutlineElement Ltr SCXW31021429 BCX0">
<h3 class="Paragraph SCXW31021429 BCX0">&nbsp;</h3>
<h3 class="Paragraph SCXW31021429 BCX0"><span class="TextRun SCXW31021429 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW31021429 BCX0"><span class="NormalTextRun SCXW31021429 BCX0">-Insufficient Cryptography</span></span><span class="EOP SCXW31021429 BCX0" data-ccp-props="{">&nbsp;</span></span></h3>
</div>
<div class="ListContainerWrapper SCXW31021429 BCX0">
<ul class="BulletListStyle1 SCXW31021429 BCX0" role="list">
<li class="OutlineElement Ltr SCXW31021429 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1">
<p class="Paragraph SCXW31021429 BCX0">* Weak Encryption Algorithms</p>
</li>
<li class="OutlineElement Ltr SCXW31021429 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1">
<p class="Paragraph SCXW31021429 BCX0">* Insufficient Key Length</p>
</li>
<li class="OutlineElement Ltr SCXW31021429 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="6" data-aria-level="1">
<p class="Paragraph SCXW31021429 BCX0">* Improper Key Management</p>
</li>
<li class="OutlineElement Ltr SCXW31021429 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="7" data-aria-level="1">
<p class="Paragraph SCXW31021429 BCX0"><span class="EOP SCXW31021429 BCX0" data-ccp-props="{">* Flawed Encryption Implementation&nbsp;</span></p>
</li>
<li class="OutlineElement Ltr SCXW31021429 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="8" data-aria-level="1">
<p class="Paragraph SCXW31021429 BCX0">* Insecure Storage of Data/Encryption Keys</p>
</li>
<li class="OutlineElement Ltr SCXW31021429 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="9" data-aria-level="1">
<p class="Paragraph SCXW31021429 BCX0">* Lack of Secure Transport Layer</p>
</li>
<li class="OutlineElement Ltr SCXW31021429 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="10" data-aria-level="1">
<p class="Paragraph SCXW31021429 BCX0"><span class="EOP SCXW31021429 BCX0" data-ccp-props="{">* Insufficient Validation and Authentication&nbsp;</span></p>
</li>
<li class="OutlineElement Ltr SCXW31021429 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="11" data-aria-level="1">
<p class="Paragraph SCXW31021429 BCX0">* Lack of Salting</p>
</li>
</ul>
</div>
<div class="OutlineElement Ltr SCXW31021429 BCX0">
<h3 class="Paragraph SCXW41000404 BCX0">&nbsp;</h3>
<h3 class="Paragraph SCXW41000404 BCX0"><em><span class="TextRun SCXW41000404 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="EOP SCXW41000404 BCX0" data-ccp-props="{">-Proper Measures</span></span></em></h3>
</div>
<div class="ListContainerWrapper SCXW31021429 BCX0">
<ul class="BulletListStyle1 SCXW31021429 BCX0" role="list">
<li class="OutlineElement Ltr SCXW31021429 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="12" data-aria-level="1">
<p class="Paragraph SCXW31021429 BCX0">* Use Strong Encryption Algorithms: Implement widely accepted and secure encryption algorithms, such as AES (Advanced Encryption Standard), RSA (Rivest-Shamir-Adleman), or Elliptic Curve Cryptography (ECC). Stay updated with current cryptographic standards and avoid deprecated or weak algorithms.</p>
</li>
<li class="OutlineElement Ltr SCXW31021429 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="13" data-aria-level="1">
<p class="Paragraph SCXW31021429 BCX0">* Ensure Sufficient Key Length: Select encryption keys with an appropriate length to ensure strong cryptographic strength. Follow industry recommendations for key lengths, considering the specific encryption algorithm being used.</p>
</li>
</ul>
</div>
</div>
<div class="SCXW31021429 BCX0">
<div class="ListContainerWrapper SCXW31021429 BCX0">
<ul class="BulletListStyle1 SCXW31021429 BCX0" role="list">
<li class="OutlineElement Ltr SCXW31021429 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1">
<p class="Paragraph SCXW31021429 BCX0">* Follow Secure Key Management Practices: Employ secure key management techniques, such as using key vaults or hardware security modules (HSMs) to securely store encryption keys. Protect keys from unauthorized access, including restricting access to authorized personnel, encrypting keys at rest, and using secure key distribution mechanisms.</p>
</li>
<li class="OutlineElement Ltr SCXW31021429 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1">
<p class="Paragraph SCXW31021429 BCX0">* Implement Encryption Correctly: Carefully implement encryption and decryption processes in the mobile application, adhering to established cryptographic libraries and frameworks. Avoid custom encryption implementations, as they are more prone to errors and vulnerabilities.</p>
</li>
<li class="OutlineElement Ltr SCXW31021429 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1">
<p class="Paragraph SCXW31021429 BCX0">* Secure Storage of Encryption Keys: Ensure encryption keys are securely stored on the mobile device. Avoid storing keys in plain text or easily accessible locations. Consider using secure storage mechanisms provided by the operating system or utilizing hardware-based secure storage options.</p>
</li>
<li class="OutlineElement Ltr SCXW31021429 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1">
<p>* Employ Secure Transport Layer: Use secure transport layer protocols, such as HTTPS (HTTP Secure), for transmitting encrypted data over networks. Implement proper certificate validation and ensure secure communication channels between the mobile app and backend systems.</p>
</li>
<li class="OutlineElement Ltr SCXW31021429 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1">
<p class="Paragraph SCXW31021429 BCX0">* Validate and Authenticate: Implement strong validation and authentication mechanisms to verify the integrity and authenticity of parties involved in the encryption process. Perform proper validation of certificates, digital signatures, or other mechanisms used for authentication.</p>
</li>
<li class="OutlineElement Ltr SCXW31021429 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="6" data-aria-level="1">
<p class="Paragraph SCXW31021429 BCX0">* Regularly Update Security Measures: Stay informed about security updates, patches, and recommendations from cryptographic libraries, frameworks, and platform providers. Keep the mobile application and underlying cryptographic components up to date to address any identified vulnerabilities or weaknesses.</p>
</li>
<li class="OutlineElement Ltr SCXW31021429 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="7" data-aria-level="1">
<p class="Paragraph SCXW31021429 BCX0">* Conduct Security Testing: Perform thorough security testing, including cryptographic vulnerability assessments, penetration testing, and code reviews. Identify and remediate any weaknesses or vulnerabilities discovered during the testing process.</p>
</li>
<li class="OutlineElement Ltr SCXW31021429 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="8" data-aria-level="1">
<p class="Paragraph SCXW31021429 BCX0">* Follow Industry Standards and Best Practices: Stay updated with industry standards and best practices related to cryptography. Organizations like NIST (National Institute of Standards and Technology) and IETF (Internet Engineering Task Force) provide guidelines and recommendations for secure cryptographic practices.</p>
</li>
<li class="OutlineElement Ltr SCXW31021429 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="9" data-aria-level="1">
<p class="Paragraph SCXW31021429 BCX0">* Use Strong Hash Functions: Choose widely recognized and cryptographically secure hash functions like SHA-256 or bcrypt. These algorithms are designed to resist attacks and provide a high level of security.</p>
</li>
<li class="OutlineElement Ltr SCXW31021429 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="10" data-aria-level="1">
<p class="Paragraph SCXW31021429 BCX0">* Implement Salting: Always use a strong random salt when hashing passwords. Salting adds an extra layer of security by making it harder for attackers to use precomputed tables or rainbow tables to crack passwords.</p>
</li>
<li class="OutlineElement Ltr SCXW31021429 BCX0" role="listitem" data-leveltext="" data-font="Wingdings" data-listid="7" data-list-defn-props="{" aria-setsize="-1" data-aria-posinset="10" data-aria-level="1">* Use Key Derivation Functions (KDFs): For password hashing, use Key Derivation Functions like PBKDF2, bcrypt, or scrypt. These functions are specifically designed for securely deriving cryptographic keys from passwords and provide additional security features like iteration counts to slow down brute-force attacks.</li>
</ul>
</div>
<div class="OutlineElement Ltr SCXW31021429 BCX0">
<p class="Paragraph SCXW31021429 BCX0">Mobile applications are vulnerable to abuse because they contain a lot of sensitive data, including personal information. Accordingly, the OWASP Foundation strives to reduce security risks or resolve issues by raising developers' awareness of security vulnerabilities and providing resources to help prevent security incidents.</p>
</div>
<div class="OutlineElement Ltr SCXW31021429 BCX0">
<p>Lockin Company provides various methods and services for strong app security services. By providing source code obfuscation and encryption functions through the mobile app security service LIAPP, LIAPP strongly protects mobile apps from analysis by encrypting important codes such as binary obfuscation and DEX and SO. Additionally, by providing the SSL Pinning function, it is possible to check the HTTPS certificate used by the app during communication and prevent network packet analysis by bypassing the certificate inspection. &nbsp;</p>
<p>Experience LIKEY, a powerful ONE TIME KEYPAD through the mobile app security keypad service, the user's important data is encrypted using a one-time random key that is newly generated every time, thereby safely protecting the user's input.&nbsp;</p>
<p>Team LIAPP provides expert consulting for companies that want to address security vulnerabilities in the OWASP Mobile Top 10 list.</p>
<p>&nbsp;</p>
<p>Reference : https://owasp.org/www-project-mobile-top-10</p>
<p>&nbsp;</p>
</div>
<div class="OutlineElement Ltr SCXW31021429 BCX0">
<p class="Paragraph SCXW31021429 BCX0"><span class="EOP SCXW31021429 BCX0" data-ccp-props="{"><span style="color: #236fa1;">#OWASP #mobile_app_protector #android_mobile_app_protector #mobile_game_application_protection #Mobile_App_Security #Mobile_App_Security_Solution #Anti_Tampering #Obfuscation </span></span><span class="EOP SCXW31021429 BCX0" data-ccp-props="{"><span style="color: #236fa1;">#Encryption #Binary Obfuscation #Detecting_Bypassing_Authentication #SecureKeypad #LIKEY #LIAPP #LIAPP</span></span></p>
<p class="Paragraph SCXW31021429 BCX0">&nbsp;</p>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="text-center mt-10 mb-10"><a class="btn btn-sm btn-liapp mr-2 rounded-full" style="text-decoration: none !important;" href="https://liapp.lockincomp.com/index.php/ja/blog">TECH BLOG</a> <a class="btn btn-sm btn-liapp ml-2 rounded-full" style="text-decoration: none !important;" href="https://liapp.lockincomp.com/index.php/ja/pricing">LIAPP PRICING</a></div>
<div class="text-center mt-10 mb-10">&nbsp;</div>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/36-tech-OWASP-Top-10</guid>
	<pubDate>2024-05-22 05:33:41</pubDate>
</item>
          <item>
	<title>New Android banking trojan called &quot;Sharkbot&quot;, its way of attack and how to defend</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/35-tech-Sharkbot-banking-trojan</link>
	<description><![CDATA[<p><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20230706043457iwt8tvb.png"></p>
<h2>New Android banking trojan called "Sharkbot", its way of attack and how to defend</h2>
<p>&nbsp;</p>
<h5><span style="font-size: 12pt; color: #e03e2d;">Malware? not the antivirus?</span></h5>
<div><strong><span style="font-size: 12pt;">Antivirus app downloaded to prevent from hacking, but this app has been controversial as it has been found to be malicious malware that infiltrates users' mobile devices, manipulates banking applications, and remits assets to the outside.&nbsp;</span></strong><br><strong><span style="font-size: 12pt;">"Sharkbot", a Trojan horse that first appeared in October 2021 and continues disturbing Google. These can be easily downloaded from the official Google Play Store, but it turns into malicious apps at some point after being installed on the user's smartphone.</span></strong></div>
<div>&nbsp;</div>
<div>&nbsp;</div>
<div><span style="font-size: 12pt;"><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20230614082657J1oq8wd.png" alt="" width="602" height="321"></span></div>
<div>&nbsp;</div>
<div>
<h5><span style="font-size: 12pt; color: #e03e2d;">What is Sharkbot?</span></h5>
<p><span style="font-size: 12pt; color: #e03e2d;"><span style="color: #000000;">Sharkbot is a new-generation Android banking Trojan discovered by the Threat Intelligence team of the security company Cleafy. Sharkbot masquerades as a mobile app or a commonly used app with common name and icon.</span><br></span></p>
<p>&nbsp;</p>
<p><span style="font-size: 12pt; color: #e03e2d;"><span style="color: #000000;"><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20230614082752e0p0NKh.png" alt="" width="602" height="207"></span></span></p>
<p><span style="font-size: 12pt; color: #e03e2d;"><span style="color: #000000;">Sharkbot is known to use the work "Sharked" in the binary of the APK file, and once the malware is installed, it executes key logging, SMS message interception, overlay attack, and remote control commands. Thee apps were already downloaded by more than 15,000 users worldwide, with most victims believed to be in the UK and Italy. Google, of course, they quickly deleted these apps and announced that they took action on other apps presumed to be Sharkbot.<br></span></span></p>
<p>&nbsp;</p>
<h5><span style="font-size: 12pt; color: #e03e2d;">How did they trick Google?</span></h5>
<p>Usually, the app must go through a pre-inspection process prior to registering an app on an official stores such as Google Play. However, Sharkbot has been registered as a safe app as if it were a safe application tricking Google. How did this happen?<br>According to the analysis, Sharkbot has a variety of anti-analysis functions which allows it to detect sandbox environment or adjust the triggering time of hacking. Above all, full-fledged malicious functions are additionally downloaded from external C&amp;C servers. This is the reason that there were no problems found during the inspection of the Google Play Store.<br>It is very difficult to catch Sharkbot that has a domain generation algorithm (DGA) that can freely change external C&amp;C domain and a geofence functions that deactivate malicious functions in a specific area.&nbsp;</p>
<p>&nbsp;</p>
<h5><span style="font-size: 12pt; color: #e03e2d;">How did Sharkbot get a permission from users?</span></h5>
<p><span style="font-size: 12pt; color: #e03e2d;"><br><span style="color: #000000;">The Sharkbot dpownloaded on the user's smartphone reveals it's malignity the moment it receives an external command. Sharkbot is similar to other malware such as TeaBot and UBEL, it displays malicious pop-ups that repeatedly ask for extensive permission to steal user's sensitive information. Sharkbot, like other similar malware such as TeaBot and UBEL, displays malicious pop-ups that repeatedly require extensive authorization to steal user's sensitive information.&nbsp;</span></span></p>
<p>&nbsp;</p>
<p style="text-align: center;"><span style="font-size: 12pt; color: #e03e2d;"><span style="color: #000000;"><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20230710082336HnsLFwS.png"></span></span></p>
<p style="text-align: center;">Source : cleafy</p>
<p style="text-align: center;">&nbsp;</p>
<p style="text-align: left;">Sharkbot will be able to get all the permissions (declared in the AndroidManifest file) needed to hack the banking app once accessibility permissions and services are activated by user.<br>Sharkbot then uses Android's accessibility service authority to display an overlaid window over a normal mobile banking app to induce the user to enter personal information, obtain the login credentials of the acquired bank app, and send them to a malicious server.&nbsp;</p>
<p style="text-align: left;">&nbsp;</p>
<p style="text-align: center;"><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/202306140833163NitFeC.png" alt="" width="343" height="278">Source : cleafy</p>
<p style="text-align: left;">&nbsp;</p>
<h5><span style="font-size: 12pt; color: #e03e2d;">ATS (Automatic Transmission System) of the Sharkbot</span></h5>
<p style="text-align: center;"><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20230614083401LjHVrGq.png" alt="" width="602" height="274"></p>
<p style="text-align: center;">Android permission of the Sharkbot&nbsp;&nbsp;</p>
<p style="text-align: center;">&nbsp;</p>
<p style="text-align: left;">This information is used to access email, social media, online bank accounts, and more. With the permissions shown in the figure above, the Sharkbot can read or send text messages and perform overlay attacks. In particular, the REQUEST_IGNORE_BATTERY_OPTIMIZATIONS permission could bypass Android's doze component and connect to the C2 server to continue its malicious action.<br>Money is now transferred out of the victim's bank account. During this process Sharkbot can intercept the device's SMS messages and use them to get the 2FA sent by the bank. As attackers do not have to register new device for fraudulent activity, it is difficult to detect that money are being stolen even if the money is transferred from the victim's bank account.&nbsp;</p>
<p style="text-align: left;">&nbsp;</p>
<h5><span style="font-size: 12pt; color: #e03e2d;">The way how SharkBot avoids detection</span></h5>
<p><span style="font-size: 12pt; color: #000000;">SharkBot has a technology to avoid from anti-virus detection. It includes several features to avoid analysis and detection, such as inspecting and running emulators, encrypting command and control communication with remote servers, and hiding icons from the home screen after installation. Strings can be obfuscated to slow down static analysis and hide all commands and sensitive information used by the malware. Below is a list of other evasion features Sharkbot are using.<br>- Anti-emulator : It determines whether it is a real phone or an emulator when malware is installed on a device.<br>- External ATS module : The installed malware downloads additional modules from C2, and external modules are &ldquo;.JAR&rdquo; files that contain all the functions used to perform ATS attacks. This module is analyzed by Sharkbot in paragraph of the ATS module.<br>- Hide icon app : If malicious program is installed, Sharkbot hides from the app's icon from the device screen.<br>- Prevent deletion : Sharkbot uses accessibility services to prevent users from uninstalling the program from the setting options like other malware.<br>- Encrypted communication : All communication between the malware and C2 is encrypted and encoded with Base64, also use the domain generation algorithm (DGA).&nbsp;</span></p>
<p>&nbsp;</p>
<h5><span style="font-size: 12pt; color: #e03e2d;">How to detect and prevent Sharkbot?</span></h5>
<p><span style="font-size: 12pt; color: #e03e2d;"><span style="color: #000000;">While various security comapanies and stores are trying to defend themselves, it is no longer safe to trust such as APP Store and Google Play.</span><br><span style="color: #000000;">Users need to be alert now that malicious apps that try to hack into banking are constantly discovering new versions. This is why users should avoid installing apps that are unknown sources or that require excessive permissions, and periodically update legitimate antivirus to the latest version. In addition, it is important for individuals to carefully check the reviews, number of downloads and developer information each time downloading an app. It is also recommended to suspect and view apps that request permission for accessibility services unless there is a special case.</span><br><span style="color: #000000;">Companies that provide banking apps should take proactive steps to strengthen the security of the apps themselves and to detect&amp;block malicious malware. LIAPP can detect apps known as Sharkbot through pattern detection. Also, LIAPP can prevent Sharkbot from hacking banking apps by performing functions such as overlay detection, remote control program detection, and screen capture program prevention. </span></span></p>
<p><span style="font-size: 12pt; color: #e03e2d;"><span style="color: #000000;">If you are a banking app service company, please contact the LIAPP team about Sharkbot. </span></span></p>
<p><span style="font-size: 12pt; color: #e03e2d;"><span style="color: #000000;">We will provide with more detailed consultation.</span><br></span></p>
<p>&nbsp;</p>
<p><span style="font-size: 12pt; color: #e03e2d;"><span style="color: #000000;">LIAPP, we provide the best service possible.&nbsp;</span></span></p>
<p><span style="font-size: 12pt; color: #236fa1;"><br><a style="color: #236fa1;"> #Anti tampering_Block #Anti tampering_protection #fintech_security #Fintech_security #Source code_protection #source_code_protection #Mobile_app_security #Mobile_game_security_solution #App_anti tampering_detection #Unity_security #Unreal_engine_security #cocos_security #Repackaging_protection #Memory_security #Memory_tampering_detection </a></span></p>
<p>&nbsp;</p>
</div>
<div class="text-center mt-10 mb-10"><a class="btn btn-sm btn-liapp mr-2 rounded-full" style="text-decoration: none !important;" href="https://liapp.lockincomp.com/index.php/ja/blog">TECH BLOG</a> <a class="btn btn-sm btn-liapp ml-2 rounded-full" style="text-decoration: none !important;" href="https://liapp.lockincomp.com/index.php/ja/pricing">LIAPP PRICING</a></div>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/35-tech-Sharkbot-banking-trojan</guid>
	<pubDate>2023-06-14 08:44:46</pubDate>
</item>
          <item>
	<title>Protect cheat engine – How to protect the game app from cheat engine</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/34-tech-Cheat-Engine-Protection</link>
	<description><![CDATA[<p><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20230706043542ngUGdOG.png"></p>
<h2>Protect cheat engine &ndash; How to protect the game app from cheat engine</h2>
<h5><span style="font-size: 12pt;">Mobile games have emerged as 'leisure at home' for many people as they went through prolonged COVID-19. However, in proportion to the growth of the global mobile game market, the most problematic is the&lsquo;game hack'. </span><br><br><span style="font-size: 12pt;">These kinds of game hacks use various techniques to attack games, and among them, memory tampering attacks are traditionally the most common hacking cases. In mobile, it is possible to play the game relatively quickly by tampering with in-game data (goods, strength, power, etc.) through memory tampering using well-known hacking tools or code fabrication in memory. Many hacking tools help with hacking. There are a lot of hacker attacks on mobile games occurring every day. To protect game services from hacker attacks, mobile game providers detect and block hacking tools in various ways.</span></h5>
<p style="text-align: center;"><span style="font-size: 12pt;"><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20230707213350XSzSs2J.png">Example of a memory tampering attack using a cheat engine&nbsp;</span></p>
<p>&nbsp;</p>
<p>However, recently, there have been memory tampering attacks that are difficult to detect by conventional methods. An example is a memory attack using a cheat engine in an emulator environment. If an app is run in an emulator (NOX, BlueStacks, ...) and fabricates the emulator's memory through a cheat engine running on a PC, hacking memory tampering can occur in a space where the security module cannot detect. That is why the cheat engine is becoming a significant problem in the game service industry.</p>
<p>&nbsp;</p>
<h5><span style="color: #e03e2d; font-size: 12pt;">Dangers of the cheat engine</span></h5>
<p>Well-known mobile game hacking tools (GameGurdian,...)try to bypass various techniques to avoid security module detection. Still, the security module is installed in the mobile device within the range that can be detected, which means detection is possible.</p>
<p style="text-align: center;"><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20230707213417To9ikch.png"></p>
<p style="text-align: center;">Detect common hacking tools in a security module&nbsp;</p>
<p style="text-align: left;">&nbsp;</p>
<p style="text-align: left;">However, in the case of cheat engines, they run games on emulators such as NOX, BlueStacks, and LD players in a PC environment. The cheat engine on the same PC modulates the memory of the game on the emulator. In that case, the security module cannot detect attacks unless it is within scope. In other words, the Cheat Engine is a process that runs on the PC. It can fabricate the memory area of the app running in the emulator in the PC environment. This makes it easy to bypass anti-debugging or process, file detection, and memory manipulation, making it impossible for basic mobile security modules to detect.&nbsp;</p>
<p style="text-align: left;">&nbsp;</p>
<p style="text-align: left;"><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20230707213455UNQysY3.png"></p>
<p style="text-align: center;">Data and memory tampering of cheat engine in an external emulator environment</p>
<p style="text-align: center;">&nbsp;</p>
<p style="text-align: left;">Memory tampering is a type of hacking that has continued from the past till nowadays on the platforms such as PC or mobile. However, hackers will focus their attacks on areas where the protection function cannot be reached. Hacking cases that tamper the memory with cheat engines targeting specific games are constantly being reported, and related data are being shared on video platforms. This type of attack is expected to spread more rapidly upcoming days.&nbsp;</p>
<p style="text-align: left;">&nbsp;</p>
<p style="text-align: left;"><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20230614081037h44Sntk.png" alt="" width="614" height="496"></p>
<p style="text-align: center;">Sharing hacking methods through cheat engines in online video platform&nbsp;</p>
<p style="text-align: center;">&nbsp;</p>
<p style="text-align: left;">A cheat engine itself is dangerous. But the biggest risk is that hacking techniques using cheat engines are actively shared through many social media or internet communities, which has a ripple effect.</p>
<p style="text-align: left;">&nbsp;</p>
<h5><span style="font-size: 12pt; color: #e03e2d;">The reality of game companies dealing with cheat engines</span></h5>
<p>Then&hellip; is there no way to prevent these cheat engines? In the case of game data, it is challenging to detect tampering because it is a value that constantly fluctuates according to the play. In addition, &ldquo;process monitoring,&rdquo; one of the representative hacking tool detection techniques, and the method of detecting an external process accessing a specific hack or memory are meaningless for the cheat engine&rsquo;s attempts for the reasons described above, so no developers are trying to stop them. That is why focusing on encryption of sensitive data or detection of fabrication.</p>
<p>Game developers sometimes use memory defense toolkits sold in-game engine assets (unity asset,&hellip;) for these functions. Still, these modules provide simple encryption and easy-to-know encryption patterns. This can result in hacking by easily bypassing it.&nbsp;</p>
<p>&nbsp;</p>
<h5><span style="color: #e03e2d; font-size: 12pt;">Defense Strategy of Cheat Engine with LIAPP</span></h5>
<p>Therefore, to defend from hacking through the cheat engine, variables must be classified according to importance, and use encrypted variables with high priority. Variable encryption is the most effective way to counter memory tampering and is also a proven method. However, in the case of such encryption logic, the effect may vary greatly depending on the developer&rsquo;s capabilities. For game performance, encryption and decryption processes are reduced and optimized by decreasing as much as possible. Still, in this case, simple encryption, such as regular or bit operation, may be applied, preventing data from being effective.</p>
<p>LIAPP, a mobile app security service, is excellent for game memory security because rather than encrypting variables based on patterns, we create new variables each time it is run. So, it is impossible to infer the encryption. LIAPP also be readily applied because it is easy to insert variable encryption into the game logic. It can be applied only by changing the variable name; it is easy to use but boast strong security that no one can easily break through.</p>
<p>There is no one-size-fits-all defense technique. Therefore, bear in mind that it can be bypassed and apply various defense techniques to make hacking as difficult as possible. Don't hesitate to contact the LIAPP team if you want to protect your mobile game. We provide the most effective security service and customized consulting for each customer.&nbsp;</p>
<p>&nbsp;</p>
<p>LIAPP, we provide the best service possible.&nbsp;</p>
<p>&nbsp;</p>
<p><span style="color: #236fa1;"><a style="color: #236fa1;">#Anti tampering_Block #Anti tampering_protection #fintech_security #Fintech_security #Source code_protection #source_code_protection #Mobile_app_security #Mobile_game_security_solution #App_anti tampering_detection #Unity_security #Unreal_engine_security #cocos_security #Repackaging_protection #Memory_security #Memory_tampering_detection</a></span></p>
<div class="text-center mt-10 mb-10"><a class="btn btn-sm btn-liapp mr-2 rounded-full" style="text-decoration: none !important;" href="https://liapp.lockincomp.com/index.php/ja/blog">TECH BLOG</a> <a class="btn btn-sm btn-liapp ml-2 rounded-full" style="text-decoration: none !important;" href="https://liapp.lockincomp.com/index.php/ja/pricing">LIAPP PRICING</a></div>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/34-tech-Cheat-Engine-Protection</guid>
	<pubDate>2023-06-14 08:22:52</pubDate>
</item>
          <item>
	<title>Four Security Checklists for Android App Development</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/33-tech-Android-security-4essential-features</link>
	<description><![CDATA[<h1><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20230706043556BQGsvbi.png"></h1>
<h2>Four security checklists for Android app development</h2>
<h5><span style="font-size: 12pt;">Android is an open-source-based operating system that allows developers to develop apps quickly. However, the fact that easy access and few constraints in development are acting as a security vulnerability. There are plenty of mobile apps produced on Android, but only a few apps with a level of security that users can use with trust. Significantly, the Android operating system is exposed to the risk of hacking through decompiling of the app or reverse engineering. </span><br><br><span style="font-size: 12pt;">If a pirated app created by copying the source code of an app through decompilation or reverse engineering is distributed, severe financial loss to the original developer as well as serious adverse effects on the reputation. </span><br><br><span style="font-size: 12pt;">In addition, if malware/malicious code is injected into the app for purposes and distributed, it may expose a leakage of personal information or device malfunctions.</span></h5>
<p><span style="font-size: 12pt;">Despite such cases, it is not easy for developers to come up with all security systems in developing mobile apps due to technical or time constraints. However, if only the necessary security is applied, issues related to time and money can be easily solved. To solve these realistic challenges, LIAPP TEAM would like to introduce four essential features for Android app security that must be checked before launching the app.&nbsp;</span></p>
<p>&nbsp;</p>
<h5><span style="color: #e03e2d; font-size: 12pt;">1. Detect and block Rooting</span></h5>
<div><span style="font-size: 12pt;">In Android, a feature to detect "rooting" is needed. Most smartphone OS maintains security through the sandbox, and rooting is an act of breaking this. Once rooted, it gets out of the sandbox's control at any time and has all the rights on the smartphone; all the actions of the attacker, such as debugging and memory dump, as well as saving files of other apps, could be done. If the app is enabled to detect rooting, it will be forced to terminate when the mobile app runs on the rooted device.&nbsp;</span></div>
<div>&nbsp;</div>
<div>
<h5><span style="font-size: 12pt; color: #e03e2d;">2. Protect source code</span></h5>
<p>Removal of the source code vulnerability is the typical security activity in the app development phase. Source code obfuscation is a technology that makes the source code difficult to read. Readability of the code is essential to the developers, but code obfuscation is the opposite which reduces code readability and makes it challenging to analyze the logic even if the app is decompiled. Note that this obfuscation technique is not applied when writing the source code but when building. Develop with good readability and convenience while reducing the readability at the building stage. However, note that source code obfuscation is the obfuscation word itself, not encryption, which means it is possible to analyze the code if followed.</p>
<p>LIAPP provides strong security through the encryption of essential source codes and obfuscation to protect source codes. LIAPP provides not a simple rearrangement obfuscation but an encryption solution that blocks all hacking tools at the source.&nbsp;</p>
<p>&nbsp;</p>
<p><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20230614071809x9bcMnb.png" width="688" height="249"></p>
<h5>&nbsp;</h5>
<h5><span style="font-size: 12pt; color: #e03e2d;">3. Verify App integrity</span></h5>
<p><span style="font-size: 12pt; color: #e03e2d;"><span style="color: #000000;">Verification of the app integrity is detecting if the app is tampered at the point of running the app. In the case of an Android app with integrity verification, a specific code is included to detect tampering. This code checks whether the app has been tampered with or changed at the time of running the app. If any tampering is detected, the app will stop or restrict. It is currently applied to financial, insurance policy, and mobile game apps which is one of the most basic required functions for app security. However, there are caveats to this method as well. Since the integrity verification logic is also part of the app, there is a risk that the logic will tamper. So, the app integrity verification logic must also be protected through source code obfuscation and source code encryption.</span><br></span></p>
<p>&nbsp;</p>
<p><span style="color: #e03e2d;"><strong>4. Protect input data by users</strong></span></p>
<p><span style="color: #000000;">A virtual keypad should be used to prevent the leakage of essential inputs, such as passwords and identification numbers that users enter when running the app. When important text or input is entered, the masking process makes it invisible on the UI, but it remains plain text within the memory allocated to the running app process. At this time, hackers can take important input through memory dumps. A virtual keypad is used to protect from those hackers; every time each key value is entered, it is stored as an encrypted value, not the value entered by the user. When this input is sent to the server after entering, the input is decrypted in the server. When this logic is implemented, ensure that the encryption channel is not easily breached by encryption using weak algorithms or by designing the encryption key exchange in an insecure way.<br>LIAPP provides a mobile keypad LIKEY to strongly prevent hacking and leakage of input by receiving different one-time data from the server every time so that the encryption text for the same input is different within one app.&nbsp;</span></p>
<p>&nbsp;</p>
<p><span style="color: #000000;"><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20230614072012HYE2a7D.png" width="918" height="412"></span></p>
<p><br>Currently, awareness of Android's security vulnerabilities has increased, and companies from different industries, such as finance, games, and more, are using security solutions, yet apps still need to be protected.</p>
<p>Users may think that the app more people are using, the safer it will be. App developers must first come forward with proper awareness and countermeasures on app security to prevent a problem such as personal information leakage and corporate brand assets leakage. Please check those four checklists before launching the app.</p>
<p>LIAPP, we provide the best service possible.&nbsp;</p>
<p><span style="color: #236fa1;"><a style="color: #236fa1;">#Anti tampering_Block #Anti tampering_protection #fintech_security #Fintech_security #Source code_protection #source_code_protection #Mobile_app_security #Mobile_game_security_solution #App_anti tampering_detection #Unity_security #Unreal_engine_security #cocos_security #Repackaging_protection #Memory_security_security #Memory_tampering_detection</a></span></p>
</div>
<div class="text-center mt-10 mb-10"><a class="btn btn-sm btn-liapp mr-2 rounded-full" style="text-decoration: none !important;" href="https://liapp.lockincomp.com/index.php/ja/blog">TECH BLOG</a> <a class="btn btn-sm btn-liapp ml-2 rounded-full" style="text-decoration: none !important;" href="https://liapp.lockincomp.com/index.php/ja/pricing">LIAPP PRICING</a></div>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/33-tech-Android-security-4essential-features</guid>
	<pubDate>2023-06-14 07:31:51</pubDate>
</item>
          <item>
	<title>Google Play Policy Update -Regarding Sensitive Information</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/tech-googleplay-permissions</link>
	<description><![CDATA[<div style="line-height: 2;"><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20230706045416vOJWHPl.png"></div>
<div style="line-height: 2; text-align: center;">&nbsp;</div>
<div style="line-height: 2;">&nbsp;</div>
<h2 style="line-height: 2;">Google Play Policy Update -Regarding Sensitive Information</h2>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;"><strong><span style="color: #e03e2d;">Google Play Developer Program Policy Update - Permissions and APIs that Access Sensitive Information</span></strong></div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;">
<h5><span style="font-size: 12pt;">Mobile applications in mobile devices are empowered by the user according to their unique functions and roles. For example, map apps ask for permission to collect location information, voice recording apps ask for microphone access, and calling apps to ask for permission to access contact information. However, if the user incorrectly allows these rights, it is dangerous because there is a risk of personal information exposure and becoming a target for hacking.</span></h5>
</div>
<div style="line-height: 2;"><br>
<p>To learn more about application 'permissions,' including this QUERY_ALL_PACKAGES, we will cover the 'permissions' policy regarding APIs and access rights to sensitive information among Google Play's Developer Program policies. First, let's take a closer look at the permissions Google restricts and what requirements are required to use them.</p>
<p>Google Play has published an updated Developer Program Policy effective May 11, 2022. Unless otherwise specified, a grace period will apply to all new and existing apps for at least 30 days from May 11 to ensure compliance with the changes (except for policies with an otherwise stated effective date). Applications that do not meet the policy requirements or fail to submit the permission request form may result in removal from Google Play. So let's take a closer look at the permissions restricted by Google and the requirements required to use them.</p>
<p>&nbsp;</p>
<br><br></div>
<div style="line-height: 2;"><span style="color: #e03e2d;"><strong>SMS and Call Log Permissions</strong></span></div>
<div style="line-height: 2;"><br>SMS and call log permission cannot be acquired unless the app has the main function of calling or texting. This is because it has a possibility to be abused your authorization to make voice calls or access phone records, you can eavesdrop on users' calls or make calls at will. Therefore, SMS and call logging rights are considered personal and sensitive user data and are subject to the following restrictions.<br><br></div>
<div style="line-height: 2; text-align: left;"><br>
<div class="hidden-xs col-md-12 col-sm-12" style="text-align: center;"><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20230714024739pfmBXMV.png"></div>
<div class="hidden-xs col-md-12 col-sm-12">&nbsp;</div>
<div class="hidden-xs col-md-12 col-sm-12">&nbsp;</div>
<div class="hidden-xs col-md-12 col-sm-12" style="text-align: left;"><strong><span style="color: #e03e2d;">Location Permissions</span></strong></div>
<div class="hidden-xs col-md-12 col-sm-12" style="text-align: left;">&nbsp;</div>
Smartphones are always checking their location with GPS. Many apps already require this location information, but if you blindly consent to provide location information, there is a risk that it will be used by malicious apps that perform stalking activities. The following requirements apply to location information access.<br><br><br>
<ul style="text-align: left;">
<li>If you no longer need the app's current functions or services, the app should not access data(example: ACCESS_FINE_LOCATION, ACCESS_COARSE_LOCATION, ACCESS_BACKGROUND_LOCATION) protected by location information access to information access.</li>
<li>Do not ask users to access location information only for advertising or analysis purposes. If your app extends the acceptable use of location data for advertising, you must comply with Google's advertising policy.</li>
<li>The app should request the minimum range (i.e., the foreground instead of the background, etc.) required to provide the current function or service that requires a location. The user should reasonably expect the location level requested for the function or service. For example, Google can request a background location without solid evidence or reject an app that accesses it.</li>
<li>Background location access is helpful to users and can only be used to provide functions relevant to the app's core functionality.</li>
</ul>
<br><br>An app can access a location using a foreground service (If the app has only foreground access, ex: 'Only during use') permission to access the location.</div>
<div style="line-height: 2;"><br>
<ul>
<li>The use of a location started as an extension of the user-initiated in-app operation.</li>
<li>The use of the location ends immediately after the user-initiated action in the application has been completed for its intended purpose.</li>
</ul>
<p>&nbsp;</p>
<p style="text-align: center;">&nbsp;</p>
</div>
<div style="line-height: 2; text-align: center;"><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20230714024818suFnqlo.png"></div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;"><strong><span style="color: #e03e2d;">All Files Access Permission</span></strong></div>
<div style="line-height: 2;"><br>Your access to files and directories contains sensitive personal information. You need to set permissions by subdividing permissions such as app control and READ_EXTERNAL_STORAGE and WRITE_EXTERNAL_STRAGE for access to photos, videos, and audios.
<ul>
<li>Apps should only request access to device storage, which is essential for operation, and cannot request access to device storage on behalf of a third party for purposes that are not relevant to the critical features displayed to users.</li>
<li>To manage access to shared storage, Android devices running R (Android 11, API level 30) or higher require the MANAGE_EXTERNAL_STORAGE permission. Any app that targets R and requests extensive access to shared storage ('All File Access') must pass the appropriate access review before publishing. Apps that are allowed to use this privilege should clearly prompt users to enable 'All File Access' for the app according to the 'Special App Access' setting.</li>
</ul>
<p>&nbsp;</p>
</div>
<div style="line-height: 2;">
<h5><strong><span style="font-size: 12pt; color: #e03e2d;">Accessibility API</span></strong></h5>
</div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;">The Accessibility API is an application that provides an enhanced user interface to support users who have a failure or are temporarily unable to interact with the device entirely. For example, users who are driving, taking care of a young child, or attending a very noisy party may need additional or alternative interfaces.&nbsp;<br><br>The following describes when the Accessibility API cannot be used.
<ul>
<li>Block features that allow users to change user settings or disable or remove apps or services without their permission (except when approved by parents or guardians through a child protection app or by an authorized administrator through corporate management software).</li>
<li>Bypassing Android's built-in privacy settings and notifications.</li>
<li>Change or use the user interface in a manner that is deceptive or otherwise in violation of Google Play developer policies.</li>
</ul>
<br>In addition, the Accessibility API is not created for remote call recording and cannot be requested for this purpose, and the use of the Accessibility API must be specified in the Google Play properties. <br><br>If an app with direct support for the disabled is a key feature, you can use the IsAccessibility Tool to specify that it is a direct accessibility app using an open and appropriate method. If you can provide the features you need without using the Accessibility API, you need to narrow down and use limited APIs and authority. (Effective date: 11 July 2022)</div>
<h5 style="line-height: 2;">&nbsp;</h5>
<div style="line-height: 2;">
<h5><strong><span style="color: #e03e2d; font-size: 12pt;">Package (App) Visibility Permission (QUERY_ALL_PACKAGES)</span></strong></h5>
<p>&nbsp;</p>
<p><span style="color: #000000; font-size: 12pt;">Starting with Android 11, a new permission called 'Wide App Visibility (QUERY_ALL_PACKAGES)' has been added. This is the authority to see a list of all applications installed on your device. Usually, if you run an app and need other apps to interact with each other, you will be granted this privilege to ensure that other apps are installed. For example, when you run a bank app, the virus vaccine turns on together.&nbsp;<br><br>However, these authorities may have to be included depending on the application. Still, if the app's core function does not require these privileges, you should limit the ability to verify the apps installed on the device. <br><br>The following is a list of permissions that Google Play allows.</span></p>
<ul>
<li style="color: #000000;"><span style="color: #000000;">Apps that search for devices</span></li>
<li style="color: #000000;"><span style="color: #000000;">An anti-virus vaccine</span></li>
<li style="color: #000000;"><span style="color: #000000;">File Management App</span></li>
<li style="color: #000000;"><span style="color: #000000;">An Internet browser</span></li>
</ul>
<p><span style="color: #000000; font-size: 12pt;"><br>Financial applications related to banks and digital wallets have also been given temporary exceptions, allowing some permission to check for installation only on a list of apps installed for security purposes, such as vaccines. This is because the financial application can be used normally only when the vaccine is installed on the device and then executed. <br><br>This authority must submit a declaration of app usage rights as below, or you will not be able to submit an app update from July 12th. Therefore, we need to update the app by July 12th.</span></p>
<p>&nbsp;</p>
<h5><strong><span style="font-size: 12pt; color: #e03e2d;">Access sensitive information when applying LIAPP</span></strong></h5>
<p>&nbsp;</p>
<p>Looking at this 'Permissions' update policy, you might think that LIAPP must be declared to use permission to detect application security threats. Recently, services that offer most app security features have announced the use of rights through the Play Console due to Google's policy changes. They recommend the use of the QUERY_ALL_PACKAGES permission to prevent apps from running in dangerous environments by detecting the installation of blacklisted cheat apps as one of the ways to block app tampering/attacking.</p>
<p>However, since the QUERY_ALL_PACKAGES permission contains quite sensitive information, it limits the ability to check the installed apps on the device unless the app's core function requires this permission. Furthermore, even if you request to use this permission, if Google refuses it, the app will not be registered, or the existing app will be deleted.</p>
<p>In order to use this permission, security procedures such as form filling, screening, and refusal of application site registration are required. However, unlike these existing security apps, LIAPP can detect and block application hacking, tampering, and threats in advance without using limited permissions, according to Google Play's policy. Currently, LIAPP detects threat behaviors that are not in the way of inquiring about installed apps and responds so that security is not threatened even if the QUERY_ALL_PACKAGES permission is deleted.&nbsp;</p>
<p>&nbsp;</p>
</div>
<div style="line-height: 2;">
<blockquote><span style="font-size: 14pt; color: #843fa1;"><em><strong>LIAPP detects apps based on threat behavior rather than checking installed apps, therefore it protects them without using the QUERY_ALL_PACKAGES permission.&nbsp;</strong></em></span></blockquote>
<br>Now, it&rsquo;s time to meet LIAPP's advanced security features that works based on the behavior. LIAPP adheres to Google Play's restrictive policies to protect mobile apps from hackers. <br><br>If you are thinking about implementing a security service to your mobile app, or if you have difficulties using permissions related to security features due to Google policy updates, please feel free to contact the TEAM LIAPP and we will properly guide you with details. <br><br><br></div>
<div style="line-height: 2;">LIAPP, we provide the best service possible.</div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;"><span style="color: #236fa1;"><a style="color: #236fa1;">#Anti tampering_Block #Anti tampering_protection #fintech_security #Fintech_security #Source code_protection #source_code_protection #Mobile_app_security #Mobile_game_security_solution #App_anti tampering_detection #Unity_security #Unreal_engine_security #cocos_security #Repackaging_protection #Memory_security_security #Memory_tampering_detection</a></span></div>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/tech-googleplay-permissions</guid>
	<pubDate>2022-09-16 01:41:25</pubDate>
</item>
          <item>
	<title>Virtual Space App Security</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/tech-virtualization-app-security</link>
	<description><![CDATA[<div style="line-height: 2; text-align: center;">&nbsp;</div>
<div style="line-height: 2;"><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20230706043712e36yTk8.png"></div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;">&nbsp;</div>
<h2 style="line-height: 2;">A Response Measure to the Security Threat of Virtual Space App</h2>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;"><span style="color: #e03e2d;"><strong><span style="font-size: 14pt;">Virtual Space App</span></strong></span></div>
<div style="line-height: 2;"><br><strong>Recently, the Virtual Space App, which allows you to use the same app dual on one smartphone, has been gaining popularity. Virtual Space App creates an isolated virtual environment within a single smartphone and provides an environment where the same app can run dually inside. For example, SNS and chat apps are dually created on one device, so you can log in to two accounts simultaneously without logging out and play the same game with two IDs simultaneously.</strong><br><strong>This convenience exposes many security threats to users who use Virtual Space App and to users who use Virtual Space App and the APP services they install on Virtual Space App to run dual.</strong></div>
<div style="line-height: 2;"><br><br></div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;"><span style="color: #e03e2d;"><strong>Two Sides of Virtual Space App security threats</strong></span></div>
<div style="line-height: 2;"><br>With this Virtual Space App, you can easily create dual apps because one app can be run through multiple instances, but behind this convenience, there are also many security problems. <br><br>Basically, apps installed on Android manage the data they generate in the sandbox area, which runs with its own UID(user identifier) and GID(group identifier) when the app is installed. These separately managed apps on the system cannot invade each other's sandbox area, so you can isolate apps from each other and protect them from malicious apps.<br><br>However, suppose you install certain apps on the Virtual Space App to use dual apps. In that case, the UID and GID of all apps in the Virtual Space App are set to the same, allowing access to each app's usage area and memory, which poses a significant security threat.</div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2; text-align: center;"><br><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20230714032443utsU5Oi.png"></div>
<div style="line-height: 2;"><br>For users who use the Virtual Space App, the Guest App installed inside the Virtual Space App requires additional user data access to prevent the app from crashing, dramatically increasing the security threat inside the mobile system. <br><br><br><br></div>
<div style="line-height: 2; text-align: center;">&nbsp;</div>
<div class="hidden-xs col-md-12 col-sm-12" style="line-height: 2; text-align: center;"><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20230714032519Tu8Ve4o.png"></div>
<div class="hidden-xs col-md-12 col-sm-12" style="line-height: 2;">&nbsp;</div>
<div class="hidden-xs col-md-12 col-sm-12" style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;"><span style="color: #e03e2d;"><strong>1.&nbsp;</strong><strong>Threats to APP</strong></span></div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;">In Virtual Space App, various isolation mechanisms provided by the Android system, such as permissions, storage, and components, are broken. Even if an app already has basic security functions, when run inside the Virtual Space App, the security sandbox is unlocked, exposing malicious malware apps installed inside to hacking threats such as accessing personal files or replicating and tampering with common apps.<br>In addition, each other's processes can be accessed within the same Virtual Space App, so you can receive the same level of threats as those from the rooted device, such as memory tampering.<br>In the case of a specific memory cheating tool, the use of Virtual Space App is recommended among execution methods on non-rooted devices, so it is emerging as one of the threats to be blocked for safe APP service.&nbsp;</div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2; text-align: center;"><br><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20230714033013h0QOXV3.png"></div>
<div class="hidden-xs col-md-12 col-sm-12" style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;">
<div class="hidden-xs col-md-12 col-sm-12">&nbsp;</div>
The following are the types of attacks that an APP installed in the Virtual Space App can receive.<br><br>
<p>(1) Increase permissions attack</p>
<p>Generally, when you use a virtual space app, your device pre-applies several permissions and features. If malicious malware APP is installed inside a virtual space app, you can use these permissions to access or leak sensitive data, such as user search history and cookies. This means that customer information of common apps installed inside virtual space apps and important information about app services may be exposed. Other processes can also access memory on my APP that can be used to expose critical memory and memory tampering attacks.</p>
<p>(2) Code insertion attack</p>
<p>Inside the Virtual Space App, a malicious Malware APP can tamper with the executables of other APPs, which are loaded via dynamic loading. At runtime, most APPs can load executable files (such as .dex files, .jar files, .so files) stored in private directories, and malicious Malware APPs installed inside the Virtual Space App can tamper with or replace these files, which can lead to code insertion attacks on other targeted APPs.</p>
<p>(3) Replication attack</p>
<p>If malicious malware APP A and regular app B are executed in the same Virtual Space App, A can secretly compress and upload important information created and entered when B is running to a remote server. You will be able to log directly into the regular app.</p>
<br><br><strong><span style="color: #e03e2d;">2.&nbsp;</span><span style="color: #e03e2d;">Users Who Installed Virtual Space App Will Face the Following Threats</span></strong></div>
<div style="line-height: 2;"><br>
<p>In fact, the Virtual Space App is designed for your convenience. In fact, the Virtual Space App is designed for your convenience. Specifically, users who install Virtual Space App are exposed to hacking threats due to Virtual Space App attacks and malicious malware attacks. Below is a description of the threats faced by the user who installed the Virtual Space App and the hacker attacks.</p>
<p>(1) Hijacking attack</p>
<p>It is a hijacking attack that can arbitrarily control the execution of an APP on a device with the numerous privileges of the Virtual Space App. For example, a malicious Virtual Space App can intercept user input from the login window after APP starts with root permissions on the victim's device. This user's login eligibility is captured, and malware can remotely upload them to the server to intercept and exploit the user's input data.</p>
<p>(2) Ransomware attack</p>
<p>Inside the Virtual Space App, a malicious Malware APP can encrypt or delete files from other APPs. The attacker demands a certain amount of ransom from the user, and the user must pay the ransom to restore the original file. Because this ransomware can be automatically propagated to cloud servers and other client devices, it is also dangerous that files encrypted with malicious Guest App can be uploaded to the cloud through the automatic synchronization mechanism of the cloud.</p>
<p>(3) Phishing attack</p>
<p>In Android 5.0 and later, third-party apps cannot call the getRunningTasks() function to obtain foreground application process information, but this is allowed within the Virtual Space App. This enables a phishing attack in which a malicious Guest App intercepts the security information that the user enters in the Android app. This may expose the information entered by the user.</p>
<br><br></div>
<div style="line-height: 2;">
<h5><span style="font-size: 14pt; color: #e03e2d;">A Response Measure to the Security Threat of Virtual Space App</span></h5>
</div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;">The fundamental reason for all these security risks is that the apps installed within the Virtual Space App share the same UID, so access rights are shared.<br>In any case, it's never a good idea to set a level of security that makes your app data accessible to anyone.<br>Therefore, in order to defend against these security threats, users should refrain from using the Virtual Space App, and service providers that service the APP should be able to detect and block the APP running in the Virtual Space App.<br><br>LIAPP detects that your mobile app is running on the Virtual Space App, protects the app by blocking it from running, and protects it from the risk of exposing sensitive information from APP users.<br>As Virtual Space App users continue to increase, LIAPP team strongly recommends preparing thoroughly for security.
<div class="hidden-xs col-md-12 col-sm-12">&nbsp;</div>
<div class="hidden-xs col-md-12 col-sm-12" style="text-align: center;">&nbsp;</div>
</div>
<div class="hidden-xs col-md-12 col-sm-12" style="line-height: 2; text-align: center;"><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20230714033053fZe9g7R.png"></div>
<div style="line-height: 2;"><br><br>LIAPP, we provide the best service possible.&nbsp;</div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;"><span style="color: #236fa1;"><a style="color: #236fa1;">#Anti tampering_block #Anti tampering_prevention #fintech_security #Source code_protection #Mobile_app_security #Mobile_game_security_solution #App_anti tampering_detection #Unity_sequrity #Unreal_engine_sequrity #cocos_security #Repackaging_prevention #Memory_security #Memory_tampering_detection</a></span></div>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/tech-virtualization-app-security</guid>
	<pubDate>2022-09-15 08:58:25</pubDate>
</item>
          <item>
	<title>Fintech App Service Vulnerability Inspection Guide</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/tech-fintech-app-security-guide-with-LIAPP</link>
	<description><![CDATA[<div style="line-height: 2;"><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20230706045516Jrz5poy.png"></div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;">&nbsp;</div>
<h2 style="line-height: 2;">Fintech App Service Vulnerability Inspection Guide from Financial Security Agency</h2>
<div style="line-height: 2;">
<h5><strong><span style="font-size: 12pt;">Hello, this is LIAPP TEAM.&nbsp;</span></strong><br><br><strong><span style="font-size: 12pt;">Fintech services must comply with the electronic financial supervision regulations under the Electronic Financial Transactions Act because electronic financial transactions are essential. Financial authorities are also working to block technical security risks, such as distributing relevant guidelines. In particular, the Financial Security Agency, the only financial security institution in Korea launched in 2015, supports safe application operation and use by conducting a "Fintech Service Vulnerability Check" to establish and check an appropriate security management system for fintech companies. </span></strong><br><br><strong><span style="font-size: 12pt;">LIAPP provides security functions that meet the client security standards and protects critical information of 17 vulnerabilities of mobile apps (Android/iOS)' among the 'fintech service vulnerability check' guidelines of the Financial Security Service. We are actively supporting them to meet the standards of the Financial Security Agency. </span></strong><br><br><strong><span style="font-size: 12pt;">This post explains preparing for the Financial Security Agency Regulations using LIAPP.</span></strong></h5>
</div>
<div style="line-height: 2;"><br><br></div>
<div style="line-height: 2;"><span style="font-size: 14pt;"><strong><span style="color: #e03e2d;">1. Check Items for Mobile app (Android/iOS) and Apply LIAPP</span></strong></span></div>
<div style="line-height: 2;">
<p>Mobile apps that provide finance and financial technology (Fintech) services are reviewed in five areas; critical information protection, transaction information forgery, client security, server security, and verification. Finance and fintech service companies should refer to development based on security checks and derive development security requirements based on items in both web and mobile areas.</p>
<p>Until now, many organizations have focused only on networks to strengthen security. However, the activation of wireless and mobile devices can cause significant problems by accessing the Internet or an internal network vulnerable to security without the organization's Internet parameters.</p>
<p>&nbsp;</p>
</div>
<div style="line-height: 2;">
<h5><strong><span style="color: #e03e2d; font-size: 12pt;">* Memory Protection</span></strong></h5>
</div>
<p style="line-height: 2;"><span style="font-size: 12pt; color: #000000;">The application execution code, user accounts, and valuable functions are decrypted and stored in plain text in memory, which can expose sensitive information inside the application. A memory exposure vulnerability occurs when sensitive information is stored on the source code and is exposed to memory in plaintext without encryption. All variables that store important information must be encrypted to solve this problem. LIAPP blocks the exposure of sensitive data in memory through a separate encryption module that can encrypt memory values.</span></p>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;">
<div style="line-height: 2;">
<h5><strong><span style="color: #e03e2d; font-size: 12pt;">* Preventing Exposure in Debug Logs</span></strong></h5>
</div>
<p style="line-height: 2;"><span style="font-size: 12pt; color: #000000;">Developers use the Log Class for debugging when developing apps. After the development is completed, if the Log Class used as the debugging code is compiled and distributed without deletion, the debugging code of the app will be executed inside the device. At this time, if the debugging code contains critical data such as personal information, server authentication information, and essential information on app logic, it can be easily leaked to the outside by malicious apps. To address this vulnerability, LIAPP deletes sensitive information in the debug log to prevent exposure of the debug log.</span></p>
<div style="line-height: 2;">&nbsp;</div>
</div>
<div style="line-height: 2;">
<div style="line-height: 2;">
<h5><span style="font-size: 12pt;"><strong><span style="color: #e03e2d;">* Applying Screen Protection for Important Information</span></strong></span></h5>
</div>
<div style="line-height: 2;">
<p>Important personal information such as resident registration number, account number, and public certificate password is converted into one-time data through LIAPP's security keypad (LIKEY) function and transmitted to the server. However, unlike the existing security keypad method that uses encryption, LIAPP outputs different one-time data each time you enter personal information and sends it to the server. And this one-time data sent to the server cannot be decrypted.</p>
<p>&nbsp;</p>
<h5><strong><span style="font-size: 12pt; color: #e03e2d;">* Applying Protection for Information Input</span></strong></h5>
<p><span style="font-size: 12pt; color: #000000;">Important personal information such as resident registration number, account number, and public certificate password is converted into one-time data through LIAPP's security keypad (LIKEY) function and transmitted to the server. However, unlike the existing security keypad method that uses encryption, LIAPP outputs different one-time data each time you enter personal information and sends it to the server. And this one-time data sent to the server cannot be decrypted.&nbsp;</span></p>
<p>&nbsp;</p>
<h5><span style="color: #e03e2d;"><strong><span style="font-size: 12pt;">* Applying Tampering Detection</span></strong></span></h5>
<p>The app tampering encourages users to leave by changing the normal app to a modulated app to steal customer information or redistributing the forged paid app through illegal sites. LIAPP detects tampering of important core files through a self-verification algorithm and protects it safely by blocking the app execution itself when app tampering is detected.</p>
<p>&nbsp;</p>
<h5><strong><span style="font-size: 12pt; color: #e03e2d;">* Applying Hacking OS Detection</span></strong></h5>
<p>Apps protected with LIAPP can block execution on rooted/jailbroken terminals and even detect installed hacking tools to hide rooting and stop app execution. This function can be applied immediately by the administrator changing it to the ON/OFF option.</p>
<p>&nbsp;</p>
<h5><span style="font-size: 12pt;"><strong><span style="color: #e03e2d;">* Applying Anti-Debugging</span></strong></span></h5>
<p>The original purpose of debugging is to find bugs in executable code, but it is used by hackers to understand how programs work or to attack apps by tampering with memory. LIAPP thus blocks debugging that attempts to access the application process and perform static or dynamic analysis. LIAPP protects sensitive information by essentially blocking applications from being analyzed by shutting down or causing errors in the debugs.</p>
<p>&nbsp;</p>
<h5><span style="font-size: 12pt;"><strong><span style="color: #e03e2d;">* Applying Source Code Obfuscation</span></strong></span></h5>
<p>&nbsp;Since the source code contains important information about the entire application, LIAPP's obfuscation function is applied to protect the source code from being viewed to protect intellectual property rights. In particular, the obfuscation of LIAPP not only rearranges the source code to make it difficult to read but also provides the ability to block the source from being seen by encrypting the entire source code of the app itself.</p>
<p>&nbsp;</p>
<h5><strong><span style="font-size: 12pt; color: #e03e2d;">* Applying Anti-Virus</span></strong></h5>
<p>&nbsp;Anti-Virus is a function to protect device users, and it blocks the app's execution so that the user's information is not leaked when the user of the app service runs the LIAPP-applied app on a device with a risk of security exposure such as malicious code.</p>
<p style="text-align: center;">&nbsp;</p>
<p style="text-align: center;"><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20230714024206llPcCE8.png"></p>
<h4>&nbsp;</h4>
<h4>&nbsp;</h4>
<h4><strong><span style="font-size: 14pt; color: #e03e2d;">2. How About Protecting Your App with LIAPP?</span></strong></h4>
<p>Since fintech apps perform security verification in a state that has already been implemented, if there are security vulnerabilities, it is necessary to modify the code or re-implement it from the design stage. Therefore, it is true that it is not efficient in terms of cost and time. Therefore, when implementing each mobile app, a security verification method is required for each analysis/design stage, development stage, and test stage. Existing security solutions take about a month to apply, but LIAPP uses a cloud server to apply all security functions with one click easily.</p>
<p>LIAPP TEAM provides security expert consulting in the development process of fintech app service companies through LIAPP or supplements security vulnerabilities. It directly diagnoses and analyzes vulnerabilities in fintech service apps to identify security threat factors and support actions. For those preparing for the Financial Security Service screening to develop and distribute fintech applications, please feel free to contact us at any time through LIAPP TEAM, and we will provide more detailed consultations.</p>
<p><br>LIAPP, we only offer the best service.</p>
<div class="col-md-10 col-md-offset-1 col-sm-10 col-sm-offset-1 col-xs-12 col-xs-offset-0">
<div class="blog-post-wrapper ptb-20">
<div class="blog-post">
<div class="blog-post-description"><span style="color: #236fa1;">#Anti_Tampering </span><span style="color: #236fa1;">#Fintech_security #Source code_protection #Mobile_app_security #Anti_Repackaging #Memory_protection #Memory_tampering_detection</span></div>
</div>
</div>
</div>
<p>&nbsp;</p>
</div>
</div>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/tech-fintech-app-security-guide-with-LIAPP</guid>
	<pubDate>2022-09-15 08:48:20</pubDate>
</item>
          <item>
	<title>[TECH]PCI SSC Security Requirements for Fintech Apps</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/tech-pci-compliance-to-mobile-application</link>
	<description><![CDATA[<div style="line-height: 2;"><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20230706043827a0mLABZ.png"></div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;">&nbsp;</div>
<h2 style="line-height: 2;">[TECH]PCI SSC Security Requirements for Fintech Apps</h2>
<div style="line-height: 2;">
<h5>&nbsp;</h5>
<h5><strong><span style="font-size: 12pt;">Hello, this is LIAPP TEAM.&nbsp;</span></strong><br><br><strong><span style="font-size: 12pt;">The security issue of Fintech apps is emerging as a hot topic in various fields worldwide. Expectations for Fintech apps are rising as financial services become more advanced and payments in non-financial IT sectors are active. Still, the frequency of personal information leakage accidents is also increasing. Therefore, to make lesser concerns about the exposure of personal information of Fintech app users, Fintech companies should do their best to strengthen security with safety as collateral, away from reckless evasion of responsibility. </span></strong><br><br><strong><span style="font-size: 12pt;">For this reason, the payment card industry data security standard (PCI-DSS, Payment Card Industry Data Security Standard) is emerging as a security standard for Fintech companies. Five multinational card payment brands, VISA, MasterCard, American Express, DISCOVER, and JCB International, have established the Payment Card Industry Security Standards Committee (Payment Card Industry Security Standards Council, hereafter PCI SSC). </span></strong><br><br><strong><span style="font-size: 12pt;">Their mission is to protect personal information related to payment and provide technical requirements for protecting cardholders' data and sensitive personal information data.</span></strong></h5>
</div>
<div style="line-height: 2; text-align: center;"><br><br></div>
<div class="col-md-12 col-sm-12 col-xs-12 " style="line-height: 2;"><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/2023071308580337SwtUB.png"></div>
<div style="line-height: 2; text-align: center;">&nbsp;</div>
<div style="line-height: 2;"><br><br>This content has been written to help you understand each item of the PCI Mobile Payment Acceptance Security Guidelines, issued separately by the PCI SSC for the security of mobile card payment systems. In addition, we will introduce the security features of LIAPP that can be applied to each item in order to comply with PCI regulations and show you how to protect Fintech apps strongly.&nbsp;<br><br><br></div>
<div style="line-height: 2;"><span style="color: #e03e2d;"><strong>LIAPP Auth</strong></span></div>
<div style="line-height: 2;"><br>
<p>4.2 Create server-side controls and report unauthorized access</p>
<p>This recommendation is for developing a comprehensive payment authorization solution that can detect, report, and disconnect unauthorized access attempts or abnormal behavior to mobile apps. This is the LIAPP Auth function of LIAPP, which blocks bypass connections directly to the app server, and can be set up to prevent the app from running through an abnormal path.&nbsp;</p>
<br><br><br></div>
<div style="line-height: 2;"><strong><span style="color: #e03e2d;">Detect and block LIAPP Root/Jailbroken and Virtual Machine Devices</span></strong></div>
<div style="line-height: 2;"><br>
<p>4.3 Prevent escalation of privileges</p>
<p>It is recommended to block routing, run apps on escaped devices, and increase security by sending alarms or warning messages if a risk is detected. However, mobile hacking is primarily caused by not blocking unauthorized connections. LIAPP can detect unauthorized access from routing, rooted or jailbroken devices, OS-tampered devices, and virtual machines, sending out alarms and strongly blocking app execution and access.&nbsp;</p>
<br><br><br></div>
<div style="line-height: 2; text-align: center;">&nbsp;</div>
<div class="col-md-12 col-sm-12 col-xs-12 " style="line-height: 2; text-align: center;"><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20230713085821fj3VoYE.png"></div>
<div style="line-height: 2; text-align: center;">&nbsp;</div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;"><strong><span style="color: #e03e2d;">LIAPP Anti-Tampering, Anti-Debugging and Anti- Repackaging</span></strong></div>
<div style="line-height: 2;"><br>4.7 Harden the application<br><br>This item is an application enhancement that prevents users from unintentionally accessing mobile apps or inserting malicious code and recommends anti-tempering with reverse engineering. LIAPP prevents analysis through decompile or reverse engineering by encrypting critical source codes, dynamic analysis during app execution with an anti-debugging function, and blocks tampering with the app by detecting signs of app modulation. Anti-repacking blocking can also prevent malicious redistribution by protecting sensitive information files used by apps.&nbsp;<br><br><br></div>
<div style="line-height: 2;"><strong><span style="color: #e03e2d;">LIAPP Realtime Hacking Tools Registration</span></strong></div>
<div style="line-height: 2;"><br>
<p>4.10 Protect against known vulnerabilities</p>
<p>It recommends patching mobile devices and apps to ensure they are always up to date. As a result, LIAPP can strongly block known hacking techniques and directly register hacking tools to address the latest security vulnerabilities.<br>LIAPP's premium plans; LIAPP Enterprise and LIAPP For Game provide servers and monitoring dashboards dedicated to customers, enabling real-time reporting of the number of app users, hacking incidence, and hacking types. In addition, users can immediately change the on/off button to enable features such as anti-debugging, integrity modulation detection, virtual machine detection, hacking tool detection, and administrator rights detection.&nbsp;</p>
<p style="text-align: center;">&nbsp;</p>
</div>
<div style="line-height: 2; text-align: center;"><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20230713085859C7VRidR.png"></div>
<div style="line-height: 2; text-align: center;">&nbsp;</div>
<div style="line-height: 2; text-align: center;">&nbsp;</div>
<div style="line-height: 2;">
<p>Compliance with PCI SSC security regulations is not just about preventing privacy leaks. In addition, it increases the reliability of Fintech apps, improving its reputation for Fintech services. As mobile payments through Fintech apps gradually play a central role in the payment industry, compliance with related regulations is now becoming an essential factor. Compliance with PCI SSC may initially seem complicated, but mobile security services such as LIAPP make it easier and simpler to apply security features.</p>
<p>If you've already released or are preparing for a Fintech app, why don't you take this opportunity to strengthen your mobile app security policy with LIAPP? About a month before the app's launch, LIAPP team recommends a schedule to distribute it to the market by strengthening security in advance. We hope that it will become a Fintech app service that runs fast in the global market with LIAPP in the future.&nbsp;</p>
<br><br>[Source of data]&nbsp;<br><span style="font-size: 10pt; color: #7e8c8d;">https://www.pcisecuritystandards.org/pci_security/</span><br><span style="font-size: 10pt; color: #7e8c8d;">https://www.pcisecuritystandards.org/about_us/</span><br><span style="font-size: 10pt; color: #7e8c8d;">PCI Mobile Payment Acceptance Security Guidelines / PCI Mobile Payment Acceptance Security Guidelines for Developers.pdf</span><br><br><br>LIAPP, we provide the best service possible.&nbsp;</div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;"><span style="color: #236fa1;">#android_application_security #ios_application_security #source_code_hardening #android_app_bundle #AAB #APK #Android App Bundle #String_encryption #Source_code_obfuscation #Anti-debugging #Anti-dumper #Anti-tampering #Rooting_detection #Virtual_machine_detection #Hacktool_detection #Malware_detection #Memory_protection #react_native</span></div>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/tech-pci-compliance-to-mobile-application</guid>
	<pubDate>2022-09-15 08:40:43</pubDate>
</item>
          <item>
	<title>[Interview] Prevention of app tampering, I solved with LIAPP!</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/interview-why-is-it-important-to-prevent-tampering-in-app-services</link>
	<description><![CDATA[<div style="line-height: 2;"><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20230706045602ENrs0Zn.png"></div>
<h1><span style="font-size: 18pt;">[Interview] Prevention of app tampering, I solved with LIAPP!</span></h1>
<div style="line-height: 2;">
<h5><span style="font-size: 12pt;"><strong>The actual damage occurred by tampering with the user's app without permission to steal property and use it for illegal money laundering. In March 2021, about 10 million won of property was stolen without using an E-gift voucher by the victim and the app operator, which is difficult to track due to anonymity.&nbsp;</strong></span><br><span style="font-size: 12pt;"><strong>Today, we will introduce the introductory period of "LIAPP" by the CEO of "Pintown," a gift voucher exchange app that tight security after this dizzying financial incident.</strong></span></h5>
</div>
<h2 style="line-height: 2;"><span style="color: #e03e2d;">Introduction to the company that introduce this LIAPP</span></h2>
<div style="line-height: 2;">Hello, I'm Songjin Pyo, the developer and the CEO of the Pintown app. Pintown is a useful fintech app that allows you to sell unused E-gift vouchers or purchase Google Play gift cards at a discount. Since it is operated 24 hours a day, you can purchase or sell E-gift vouchers quickly and easily through the app regardless of time and place.<br>I developed Pintown because I wanted to sell a gift card that I received, so I installed an existing app, but it was difficult to use because of an error or inconvenient UI. So Pintown is what I made when I decided to make an app that is easy to use and error-free.&nbsp;<br><br></div>
<div style="line-height: 2;"><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20230612053239K02cNhQ.png" alt="" width="1384" height="880"></div>
<div class="col-md-12 col-sm-12 col-xs-12 " style="line-height: 2;">
<div class="col-xs-12 col-md-12" style="text-align: center;"><a href="https://play.google.com/store/apps/details?id=kr.pintown.user.exchange&amp;utm_campaign=LIAPP" target="_blank" rel="noopener noreferrer"><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20230612053306kDZwfoi.png" alt="" width="186" height="72"></a></div>
</div>
<h2 style="line-height: 2;"><span style="color: #e03e2d;">LIAPP, that I met after the app tampering incident</span></h2>
<div style="line-height: 2;">Mobile anti tampering prevention &ndash; The introduction of 'LIAPP' of 'Pintown', a E-gift voucher exchange app that boasted iron security after a dizzying financial accident. The hacker hacked the victim's phone and remotely controlled it, installed a tampered Pintown app, purchased an E-gift card worth about 10 million won, converted it into cash, and stole it. The victim didn't even know that his phone had been hacked.<br>After this incident, I realized late that the free source code obfuscation solution did not prevent app tampering or reverse engineering. So I was introduced to the LIAPP through acquaintances to prevent a recurrence of financial incidents.&nbsp;<br><br></div>
<h2 style="line-height: 2;"><span style="color: #e03e2d;">After the introduction of LIAPP, there was no hacking and tampering of the app in Pintown</span></h2>
<div style="line-height: 2;">In order to prevent financial incidents, Pintown has already added various functions such as capture prevention, remote control prevention, and mobile phone verification to the app itself to prevent financial incidents.In order to prevent financial incidents, Pintown has already added various functions such as capture prevention, remote control prevention, and mobile phone verification to the app itself to prevent financial incidents.
<p style="text-align: left;">LIAPP is a comprehensive mobile app security solution with all mobile security features. After applying LIAPP, we directly conducted tampering tests such as reverse engineering of the source code and various hacking attempts. In fact, we have not had single security or financial incident since using the LIAPP.&nbsp;</p>
<p style="text-align: center;">&nbsp;</p>
<p style="text-align: center;"><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20230707054954KCoSYdu.png" width="364" height="167"></p>
</div>
<div class="col-md-12 col-sm-12 col-xs-12 " style="line-height: 2; text-align: center;">&nbsp;</div>
<h2 style="line-height: 2;"><span style="color: #e03e2d;">Simplified customer verification process with enhanced security after the introduction of LIAPP</span></h2>
<div style="line-height: 2;">Before the introduction of LIAPP, due to concerns about accidents, we complicated the identity verification process. However, since the introduction of LIAPP, the customer verification process has been simplified compared to before. As a result, my workload related to developing and managing the app has decreased. In addition, since all app hacking and threat attempts are monitored through the re-app, it is possible to preemptively respond to hacking and app tampering, enabling more stable service operations.&nbsp;</div>
<div style="line-height: 2;">&nbsp;</div>
<h2 style="line-height: 2;"><span style="color: #e03e2d;">If you love running app services, we strongly recommend introducing LIAPP.</span></h2>
<div style="line-height: 2;">I had a security incident with a tampered app, and the fixed customer churn and sales were severely affected, and I finally introduced the LIAPP. In my case, the loss caused by the incident is greater than the cost of adopting LIAPP. If you care about and love the service you are running, I highly recommend that you prevent app security threats through LIAPP.<br>Mobile apps allow you to look into the source code, which is the core design of the app, and tampering is easy. Don't be complacent about mobile security precautions because of the current cost and difficulties.&nbsp;</div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;">
<p class="p1"><span style="font-size: 14pt; color: #843fa1;"><strong><em>"In my case, the loss from the incident is greater than the cost of deploying the LIAPP." </em></strong></span></p>
<p class="p1"><span style="font-size: 14pt; color: #843fa1;"><strong><em>"I hope you do not be complacent about taking precautions for mobile security because of the immediate cost and difficulty."&nbsp;</em></strong></span></p>
<p class="p1">&nbsp;</p>
<p class="p1"><span style="font-size: 12pt; color: #236fa1;">#AntiTampering </span><span style="color: #236fa1;">#Anti tampering_protection #fintech_security #Fintech_security #Source code_protection #Mobile_app_security #Mobile_game_security_solution #App_Anti tampering_detection #Unity_security #Unreal_engine_security #cocos_security #Repackaging_protection #Memory_security #Memory_tampering_detection</span></p>
<p class="p1">&nbsp;</p>
</div>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/interview-why-is-it-important-to-prevent-tampering-in-app-services</guid>
	<pubDate>2022-09-15 08:37:48</pubDate>
</item>
          <item>
	<title>Why Do Hackers Attack Mobile Apps?</title>
	<link>https://liapp.lockincomp.com/index.php/ja/blog/mobile-app-hacking-and-protection</link>
	<description><![CDATA[<div style="line-height: 2; text-align: center;"><img src="https://djez7e2nzzqm3.cloudfront.net/guide/20230706043929JFH1LUf.png"></div>
<h1 style="line-height: 2;">Why Do Hackers Attack Mobile Apps?</h1>
<div style="line-height: 2;"><span style="font-size: 14pt;"><strong>Mobile Application Security Status</strong></span></div>
<div style="line-height: 2;">With mobile devices and mobile apps in various industries, everyday life has become more accessible in the vast majority of area. But still, we need to be careful of never-stop security incidents. Then, why do these incidents from security breaches keep continuing to occur?<br>It&rsquo;s because mobile app services contain a lot of &lsquo;customer data&rsquo;. While it is effortless to access customer information through mobile apps, apps are quite vulnerable compared to PC or Server security-wise since anyone can easily view the source code with a simple tool.<br>More companies launch mobile app services as their primary business model, and more companies provide internal systems and services through mobile apps. In this post, we would like to discuss hacking types of mobile apps and how to secure them from app developers&rsquo;, app operation managers&rsquo;, and security managers&rsquo; point of view.<br><br><span style="font-size: 14pt;"><strong>How Do Hackers Attack Mobile Apps?</strong></span></div>
<div style="line-height: 2;">Normally mobile app service users download the app through official app markets. Before registering mobile apps on the market, apps will be reviewed for its stability, security, and any harmful contents inside and because of this review process, we could think that mobile apps are relatively safer than PC. However, hackers can distribute malicious apps using a strategy to bypass this app market review and they will keep upgrading their attack techniques. The risk of mobile app hacking is increasing every day.<br><br><span style="color: #e03e2d;"><strong>Source Code Leakage and Unauthorized Reuse</strong></span></div>
<div style="line-height: 2;">The source code is a blueprint for mobile apps, and it is one of digital assets in the company. For a perfect launch of the mobile app, it takes thousands of hours to plan, create, experiment and revise. Some people view source code leakage is not that risky as they consider source code is just a blueprint of the service itself. However, it is very dangerous as various kinds of access keys are stored in the source code which are shared by developers and hackers can always reuse those keys as much as they want.<br><br><strong><span style="color: #e03e2d;">App Tampering</span></strong></div>
<div style="line-height: 2;">App Tampering refers to all kinds of acts by modifying normal apps unauthorizedly to achieve the hacker&rsquo;s specific purpose. The purpose of app tampering could be two reasons. First, it is to extort a corporate&rsquo;s original technology and sales know-how that are contained in the app, and it is to obtain monetary or non-monetary benefits by illegally using app&rsquo;s additional services or reselling of paid content which hackers gained without permission. Second, it is to steal user information of the app service and gain illegal monetary or non-monetary by faking the app which is altered by hackers as if it is an official one.<br><br><strong><span style="color: #e03e2d;">Inserting Malicious Codes</span></strong></div>
<div style="line-height: 2;">Most of app developers could encounter the situation to use various open sources to save development time and hackers will use this opportunity to insert malicious codes. They use the auto-fill function for phishing to extort customers&rsquo; personal data by inducing developers to insert the code on their developing apps to perform malicious codes and extort frequently entered app users&rsquo; account, personal and card payment information.<br><br><strong><span style="color: #e03e2d;">Memory Hacking</span></strong></div>
<div style="line-height: 2;">Memory hacking means the way to forge or tamper with data that is in the memory. Previously hackers used to extract the password of the account from outside, but memory hacking is infiltrating to mobile memory and manipulating the account and the amount of money after installing a separate backdoor program. Memory hacking means the way to forge or tamper with data that is in the memory. Previously hackers used to extract the password of the account from outside, but memory hacking is infiltrating to mobile memory and manipulating the account and the amount of money after installing a separate backdoor program. The damage can be made not only from leakage of financial information from financial apps, but from game apps such as leakage of personal information, in-app purchases game items without permission, and speed hacking to cheat game.<br><br></div>
<div style="line-height: 2;">&nbsp;</div>
<div class="col-md-12 col-sm-12 col-xs-12 " style="line-height: 2;"><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20230612053112tfHTnvx.png" alt="" width="1011" height="639"></div>
<div style="line-height: 2;"><br><strong><span style="font-size: 14pt;">How Can We Secure Mobile Apps?</span></strong></div>
<div style="line-height: 2;">What would be the best way to protect our mobile apps? Current technology to secure mobile apps are source code obfuscation, source code encryption, anti-tampering, memory protection, anti-debugging etc. To protect mobile apps more efficiently, it is strongly recommended to mix absolute necessary security features for app services and use optional functions together to protect the app from diverse kinds of attacks.<br><br><strong><span style="color: #e03e2d;">Source Code Protection</span></strong></div>
<div style="line-height: 2;">Well-known technologies to protect source code are obfuscation and encryption. Source code obfuscation is to change the whole or part of source code to be difficult or impossible to read. This technology aims to make reverse engineering difficult by changing class name, function name and control flow, and with string encryption and API hidden. However, it will not be enough to protect source code only with source code obfuscation because obfuscation can be analyzed if you put a lot of time and effort. To protect mobile apps more strongly, source code should be encrypted, so that original code cannot be analyzed at all with source code obfuscation and encryption together.<br><br><strong><span style="color: #e03e2d;">Anti-Tampering</span></strong></div>
<div style="line-height: 2;">Tampering means to add, delete, or modify particular source code on existing normal apps therefore the tampered app will share the original source code partially. Based on this similarity, it is able to find apps with similar source code but a different writer. Also, it is possible to check app&rsquo;s tampering status by integrity check when the app starts to run.<br><br><strong><span style="color: #e03e2d;">Memory Protection</span></strong></div>
<div style="line-height: 2;">Memory protection is a way to control application memory access and prevents from accessing memory where the process is unallocated. It is possible to protect mobile app by preventing from tampering with value in memory.<br><br><strong><span style="color: #e03e2d;">Anti-Debugging</span></strong></div>
<div style="line-height: 2;">Anti-Debugging is a technique to make analysis difficult by interrupting debugging behavior. When the app is applied with anti-debugging attacked by debugging, there are diverse ways to prevent apps from analyzing by hackers such as occurring the error purposely or terminating debugger programs.</div>
<div class="col-md-12 col-sm-12 col-xs-12 " style="line-height: 2;"><img style="display: block; margin-left: auto; margin-right: auto;" src="https://djez7e2nzzqm3.cloudfront.net/guide/20230612053135hfH5gR5.png" alt="" width="1011" height="639"></div>
<div style="line-height: 2;">&nbsp;</div>
<div style="line-height: 2;">LIAPP is the most suitable security solution for mobile application by providing all mentioned features. In the next post, we will have a deeper look about each security features to protect your app against hacker&rsquo;s malicious attack.</div>
<div style="line-height: 2;">
<div class="col-md-12 col-sm-12 col-xs-12 ">&nbsp;</div>
<div class="col-md-12 col-sm-12 col-xs-12 "><span style="color: #236fa1;">#android_application_security #ios_application_security #source_code_hardening #android_app_bundle #AAB #APK #Android App Bundle #String_encryption #Source_code_obfuscation #Anti-debugging #Anti-dumper #Anti-tampering #Rooting_detection #Virtual_machine_detection #Hacktool_detection #Malware_detection #Memory_protection</span></div>
</div>]]></description>
	<category>book</category>
	<author><![CDATA[Lockin Company]]></author>
	<guid isPermaLink="true">https://liapp.lockincomp.com/index.php/ja/blog/mobile-app-hacking-and-protection</guid>
	<pubDate>2022-09-15 08:11:15</pubDate>
</item>
      </channel>
</rss>
