NHN AppGuard helps prevent manipulating application codes. It also detects and prohibits any tools which try to manipulate memory, speed or codes through patterned or heuristic method.
Functions are provided as follows:
For the NHN AppGuard service, please refer to the glossary on Table 1.
[Table 1] Glossary for NHN AppGuard
Term | Description |
---|---|
Heuristic Detection | A method of general detection on cheating tools which prevents taking a bypass |
Code Manipulation | A manipulative act by analyzing code decompiling to gain profits |
Decompile | An act of converting compiled codes to high-level language for easy analysis |
File integrity | An act of checking if original files are changed due to code manipulation |
Rooting, Jail Break | Upgrading smartphone user’s restricted authority to the highest root level so as to gain access to all system parts without a hitch |
Behavior Based Detection | A method of detection by copying how a cheating tool does to cheat |
System Restriction | Sanctions on detected logs automatically posed by a system, not by an operator’s manual act |
Figure 1 displays how NHN AppGuard works: Using NHN AppGuard’s SDK, the code is integrated with the application (optional), and then app protection service (required) is completed and deployed on a console or Command Line Interface (CLI). The NHN AppGuard Engine sends a detective log to a server so as to block or sanction against abuses.