시리즈의 내용이 정리 문서에서 다루어졌는지 여부 표시.
링크
1,2,3,4,5,6,9,10 (안드로이드, 코드까지)
Impede Dynamic Analysis and Tampering
동적분석과 조작 방해
MSTG-RESILIENCE-1
MSTG-RESILIENCE-2
MSTG-RESILIENCE-3
MSTG-RESILIENCE-4
MSTG-RESILIENCE-5 (에뮬레이터 검사인데, 아직은 필요없음)
The app detects, and responds to, being run in an emulator.
MSTG-RESILIENCE-6
The app detects, and responds to, tampering the code and data in its own memory space.
MSTG-RESILIENCE-7
The app implements multiple mechanisms in each defense category (8.1 to 8.6). Note that resiliency scales with the amount, diversity of the originality of the mechanisms used.
MSTG-RESILIENCE-8
The detection mechanisms trigger responses of different types, including delayed and stealthy responses.
MSTG-RESILIENCE-9 (난독화)
Device Binding
MSTG-RESILIENCE-10
The app implements a 'device binding' functionality using a device fingerprint derived from multiple properties unique to the device.
Impede Comprehension (방해 방식 이해)
MSTG-RESILIENCE-11
MSTG-RESILIENCE-12
If the goal of obfuscation is to protect sensitive computations, an obfuscation scheme is used that is both appropriate for the particular task and robust against manual and automated de-obfuscation methods, considering currently published research. The effectiveness of the obfuscation scheme must be verified through manual testing. Note that hardware-based isolation features are preferred over obfuscation whenever possible.
Impede Eavesdropping (방해 엿듣기)
MSTG-RESILIENCE-13
As a defense in depth, next to having solid hardening of the communicating parties, application level payload encryption can be applied to further impede eavesdropping.