Quixxi Shield provides codeless application protection against hackers looking to clone, tamper, inject malicious code, or in general exploit your mobile app. A simple drag and drop feature for both Android and iOS apps is all you need, to apply a sophisticated set of security layers, for quick and easy mobile app protection.


Protect your apps in minutes
Quixxi Shield provides codeless protection against hackers looking to clone, tamper with, inject malicious code into and – in general – exploit your mobile app. A simple drag and drop both for Android and iOS apps is you need to apply a sophisticated set of state-of-art security layers, offering the necessary protection quickly and easily.

TAILOR YOUR SECURITY
Security is a concept that implies different choices and shades based on individual mobile apps.
For this reason, we built Quixxi Shield to provide a full customization of mobile security and have you covered irrespective of the business you’re in.
All the security settings are configurable directly from the portal via checkboxes, without any coding involved. Finally, the Quixxi dashboard will allow you to remotely monitor what’s going on and take appropriate actions when required

TAILOR YOUR SECURITY
Security is a concept that implies different choices and shades based on the particular target app.
For this reason we built Quixxi Shield in order to provide a full customization of mobile security and have you covered independently from your business area.
All the security settings are configurable directly from the portal via checkboxes, without any coding involved. Finally, Quixxi Dashboard will allow you to remotely monitor what’s going on and take the appropriate action when required
REVERSE ENGINEERING PROTECTION
Quixxi secures your mobile applications by making it hard for hackers to reverse engineer the source code. Depending on the platform, Quixxi Shield leverages a variety of innovative and technologically advanced techniques which include, but are not limited to:
- Encrypted Strings – Quixxi can remove the hardcoded strings in the classes replacing them with native layer calls. Removed strings are encrypted and stored in the native layer in order to protect the associated data
- Method Call Hiding – Quixxi can hide the method calls too, filling their body declaration with native method calls. Code readability for the attackers is going to dramatically drop down, in order to protect the trivial understanding of the business logic
- Dynamically derived encryption keys – Quixxi doesn’t store the keys used to encrypt strings in the application and the key to decrypt encrypted strings will vary from application to application. Moreover different keys will handle different content
- Randomization – Quixxi will replace the original variables and methods labels with incomprehensible ones that will be different for each application, in order to make the sequence of calls unique and unforeseeable
- Spoofing techniques – Quixxi will fool the attacker and increase the cracking effort inserting spoof Android code in multiple ways
- Library Protection – Quixxi can apply its effects also on Android libraries, supporting both aar and jar files. After a simple drag’n’drop the library code will be moved into the native layer
- Debug log removal – Quixxi will remove the Android logs because they can provide hints for realizing a successful hack.
- Static resources encryption – Quixxi will be able to encrypt the images used in your Android app.


REVERSE ENGINEERING PROTECTION
Quixxi secures your mobile applications by destroying the hackers ability to understand your code by decompiling it. Depending on the platform Quixxi Shield leverages a variety of innovative and technologically advanced techniques
They include, but are not limited to:
- Encrypted Strings – Quixxi can remove the hardcoded strings in the classes replacing them with native layer calls. Removed strings are encrypted and stored in the native layer in order to protect the associated data
- Method Call Hiding – Quixxi can hide the method calls too, filling their body declaration with native method calls. Code readability for the attackers is going to dramatically drop down, in order to protect the trivial understanding of the business logic
- Dynamically derived encryption keys – Quixxi doesn’t store the keys used to encrypt strings in the application and the key to decrypt encrypted strings will vary from application to application. Moreover different keys will handle different content
- Randomization – Quixxi will replace the original variables and methods labels with incomprehensible ones that will be different for each application, in order to make the sequence of calls unique and unforeseeable
- Spoofing techniques – Quixxi will fool the attacker and increase the cracking effort inserting spoof Android code in multiple ways
- Library Protection – Quixxi can apply its effects also on Android libraries, supporting both aar and jar files. After a simple drag’n’drop the library code will be moved into the native layer
- Debug log removal – Quixxi will remove the Android logs because they can provide hints for realizing a successful hack.
- Static resources encryption – Quixxi will be able to encrypt the images used in your Android app.

TAMPERING DETECTION
Quixxi Shield makes use of an advanced technology to detect the genuineness of the app run by the final user. Our security engine ensures that both you and the honest users will not be easily exploited.
- Threats Detection – Quixxi will automatically terminate your app instance whenever a runtime threat is trying to break the security configuration of your choice, providing directly on the portal both the attacker and the offence details.
- App Integrity Check – Quixxi will double check if your app has been modified from its original version and close it when it is the case, preventing any risk for the final user.
- In-App purchase protection – Quixxi will secure your app and defend it against the circumvention of the in-app purchase logic. Start cashing the premium features you are selling!
- Debug log removal – Quixxi will remove the Android logs because they can provide hints for realizing a successful hack.
- Static resources encryption – Quixxi will be able to encrypt the images used in your Android app.

TAMPERING DETECTION
Quixxi Shield makes use of an advanced technology to detect the genuineness of the app run by the final user. Our security engine ensures that both you and the honest users will not be easily exploited.
- Threats Detection – Quixxi will automatically terminate your app instance whenever a runtime threat is trying to break the security configuration of your choice, providing directly on the portal both the attacker and the offence details.
- App Integrity Check – Quixxi will double check if your app has been modified from its original version and close it when it is the case, preventing any risk for the final user.
- In-App purchase protection – Quixxi will secure your app and defend it against the circumvention of the in-app purchase logic. Start cashing the premium features you are selling!
- Debug log removal – Quixxi will remove the Android logs because they can provide hints for realizing a successful hack.
- Static resources encryption – Quixxi will be able to encrypt the images used in your Android app.
RUNTIME PROTECTION
Many attacks are carried out by trying to exploit vulnerabilities at runtime. Even when it doesn’t come to piracy you may need to stop users from violating rules. Quixxi can remotely terminate the app instance whenever the right conditions for its execution are not met.
- Certificate Pinning – Quixxi can help implement the validation of the certificate expected to be received from the client app when contacting the server, preventing the session to start when the match doesn’t occur.
- Root/Jailbreak Detection – Quixxi can detect if an app is running on a rooted/jailbroken phone, where an unplanned excess of exposed data may happen due to a tweak of the official operative system. The final user will then end up being booted out of the app for his own safety.
- Emulator Detection – Quixxi can detect if your app is being analysed in an emulator and terminate the app, thereby preventing IP theft.
- Attached Debugger Detection – Quixxi can detect if a debugger has been attached to the app in order to examine its variables and evaluate its expressions at runtime. In this scenario the app will be immediately terminated
- Malware Detection – Quixxi can quickly detect upon app launch, if the phone in which the app is running has malware installed and make it inaccessible, avoiding consequences that can damage your business and/or your final customer
- Runtime resources encryption – Quixxi can encrypt the files produced at runtime in your iOS app plus the Shared Preferences/User Defaults that otherwise can be easily accessed in rooted/jailbroken devices


RUNTIME PROTECTION
Many attacks are carried out by trying to exploit vulnerabilities at runtime. Even when it doesn’t come to piracy you may need to stop users from violating rules. Quixxi can remotely terminate the app instance whenever the right conditions for its execution are not met.
- Certificate Pinning – Quixxi can help implement properly the validation of the certificate expected to be received from the client app when contacting the server, preventing the session to start when the match doesn’t occur.
- Root/Jailbreak Detection – Quixxi can detect if an app is running on a rooted/jailbroken phone, where an unplanned excess of exposed data may happen due to a tweak of the official operative system. The final user will then end up being bounced out of the app for his own safety.
- Emulator Detection – Quixxi can detect if somebody is trying to analyze your app running it inside an emulator and close the app stopping this process
- Attached Debugger Detection – Quixxi can detect if a debugger has been attached to the app in order to examine its variables and evaluate its expressions at runtime. In this scenario the app will be immediately terminated
- Malware Detection – Quixxi can quickly detect upon app launch, if the phone in which the app is running has malware installed and make it inaccessible, avoiding consequences that can damage your business and/or your final customer
- Runtime resources encryption – Quixxi can encrypt the files produced at runtime in your iOS app plus the Shared Preferences/User Defaults that otherwise can be easily accessed in rooted/jailbroken devices
How can your business benefit from Quixxi Security?
How can your business benefit from Quixxi Security?
TESTIMONIALS

The NSW Government’s Seniors Card app makes it even easier to find businesses offering discounts so Seniors Card members can save even more money.
Quixxi Shield was implemented from the outset and provides real time data on who is using it, how they use it plus information like when and where it is accessed. This information has been used to enhance and evolve the app to deliver an even more rewarding experience for over 20,000 seniors in NSW.
TESTIMONIALS

The NSW Government’s Seniors Card app makes it even easier to find businesses offering discounts so Seniors Card members can save even more money.
Quixxi Shield was implemented from the outset and provides real time data on who is using it, how they use it plus information like when and where it is accessed. This information has been used to enhance and evolve the app to deliver an even more rewarding experience for over 20,000 seniors in NSW.
TRY OUR QUIXXI SHIELD FREE TODAY