Defend against hackers and keep your Java-based apps safe for your end users
Get a quote
Robust protection, whatever the environment and OS.
Stringer works harder than other Java obfuscators to keep your apps safe. It protects your code, transparently encrypts your resources, and ensures the integrity of your apps. It secures your sensitive method calls and logic. And it carries out dynamic key calculations at runtime for added protection.
Stringer secures standalone and desktop apps as well as enterprise apps. It currently protects millions of Java-based app users worldwide. It frees them from the fear of cyber attacks so they can get on with doing their best work.
- Clever cryptography that hides your app’s logic
- Protection against both static and dynamic analysis
- Easy to configure and install
- Integrity checks prevent tampered-with apps from starting
- If it’s Oracle-certified, then Stringer can protect it
- Dynamic key calculations provide an extra layer of protection
Stringer’s toolkit is designed to stop a range of malicious attacks.
Code Protection and Virtualization
Stringer hides the method calls and logic within your apps. And its hide access and string encryption features work together to make sure bad actors can’t decompile your code.
Unlike other protection products, Stringer's resource encryption is transparent. It uses strong cryptography to stop hackers from accessing your valuable assets.
Stringer uses dynamically-calculated, context-sensitive keys. That means it knows if a bad actor has tampered with your apps. If it detects a change, its core engine will generate incorrect keys. And that will prevent the app from starting.
How it works
Protective layers that secure your code and assets.
String encryption works a little bit like a one-way mirror. On one side, you can only see your reflection. But the other side is transparent. Stringer keeps bad actors on the first side of the mirror. They only see a protected, unreadable version of the string code reflected back at them.
We use context-sensitive encryption keys to decrypt protected strings. That makes it impossible for a hacker to carry out a static analysis on your apps.
The method calls and access to fields within your apps have meaningful logic that you can understand. But Hide Access virtualizes and conceals this logic so that hackers can’t make any sense of it.
This process also protects against hooking and debugging attempts. So it secures the sensitive logic in your apps and libraries.
Stringer encrypts the assets and resources within your apps. These include media files, text files and HTML files. At the end of this process, your apps contain exactly the same number of files. But hackers can’t tell what they are anymore. This is an automatic encryption process, with no coding required.
Stringer works with the final containers during this process. That’s important, because it means it can pre-calculate the dynamic keys before execution. This is a unique process that adds an extra layer of protection.
Stringer’s integrity control identifies binaries that have been damaged or deliberately modified. If it does, it won’t allow them to function. That means hackers can’t inject malicious code to get at your end user’s sensitive information such as passwords or credit card numbers. And they can’t disable a licensing subsystem.
With Stringer Enterprise, you can configure integrity control manually. So, you can enable or disable the JAR’s signature check, for example. And you can enable or disable the JAR’s contents check and tamper detection.
A unique approach to securing your Enterprise Java apps.
Other Java obfuscators only tend to protect your bytecode in Java classes. They don’t work directly with the final enterprise app containers. Because Stringer does work with the final containers, it can protect assets transparently. It also helps to make your apps tamper proof.
Stringer is smart. It can automatically recognize the type of enterprise app it’s protecting. So, it can differentiate between a Spring and Spring Boot app, for example. And it can identify web app containers like WAR and EAR.
This intelligence and depth of security means that individual parts of your app - like the code and assets - are better protected from attacks. Get a quote
Introducing the future of app security. Designed for the FinTech, MedTech and Defense industries.
While creating Crypto Module, we were inspired by the security of the smart card industry. So we used the same innovative techniques that are used there. The result is a state-of-the-art Virtual Trusted Execution Environment (vTEE).
Crypto Module allows you to protect your sensitive cryptographic operations in real time. And it also helps you to meet industry-related certification. Companies that use it to secure their apps have been certified by some of the most reputable certification labs in the world. Learn more
Our other products
Powerful protection for Android and IOS apps that uses a dynamic native engine to keep your code safe.
The industry standard for developing identification, payment, and other smart card applications.