ObfGuard Product
A practical protection layer for iOS and Android: obfuscation, encryption, integrity checks, and CI-first workflows.
Core capabilities
ObfGuard combines layered obfuscation, encryption, and runtime checks with predictable build workflows.
Control-flow obfuscation
Transform program flow and complicate decompilation output. Tune complexity per module.
String and constant encryption
Encrypt secrets, API endpoints, and sensitive constants with explicit exceptions to maintain behavior.
Symbol hardening
Reduce symbol leakage, randomize metadata, and remove hints that aid attackers.
Anti-tamper integrity
Detect patching, repackaging, and binary modification with configurable responses.
Runtime guardrails
Defensive checks against runtime inspection and instrumentation paths.
Reporting and verification
Build-time protection summaries with audit-friendly export options.
Policy-driven protection
Policies are version-controlled, scoped by module, and tuned per environment. Start with a baseline and tighten for sensitive flows.
Policy anatomy
- Tier selection (Balanced, Strict, Hardened)
- Module and package scopes
- Explicit exclusions
- Reporting and audit settings
Sample policy snippet
tiers:
balanced:
obfuscation: medium
string_encryption: standard
scopes:
- name: licensing
match: com.obfguard.licensing.*
tier: hardened
- name: ui
match: com.obfguard.ui.*
tier: balanced
Policies are human-readable, versioned in git, and applied consistently in CI.
Build pipeline friendly
Release flow
- Compile and sign your release build
- Run ObfGuard with the selected policy
- Generate a hardened binary and protection report
- Upload artifacts and ship
Deterministic outputs
Policy versioning keeps releases stable and reproducible. Pin ObfGuard versions to keep outputs consistent.
What ObfGuard is
A defensive tool to raise attacker cost, reduce leak risk, and harden release artifacts for iOS and Android.
What ObfGuard is not
Not a guarantee that reverse engineering is impossible and not a substitute for secure backend design, auth, encryption-at-rest, or key management.
Ready to protect your next release?
Start with a baseline policy and expand coverage as you learn.