Skip to content

Commit

Permalink
delete 8.9 as the same as 8.12
Browse files Browse the repository at this point in the history
  • Loading branch information
Sven Schleier committed Nov 7, 2017
1 parent 1933c84 commit ba68e78
Showing 1 changed file with 4 additions and 5 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -30,21 +30,20 @@ The following considerations apply:
| **8.6** | The app detects, and responds to, tampering the code and data in its own memory space. ||
| **8.7** | The app implements multiple mechanisms in each defense category (8.1 to 8.6). Note that resiliency scales with the amount, diversity of the originality of the mechanisms used. ||
| **8.8** | The detection mechanisms trigger responses of different types, including delayed and stealthy responses. ||
| **8.9** | All executable files and libraries belonging to the app are either encrypted on the file level and/or important code and data segments inside the executables are encrypted or packed. Trivial static analysis does not reveal important code or data. ||
| **8.10** | Obfuscation is applied to programmatic defenses, which in turn impede de-obfuscation via dynamic analysis. ||
| **8.9** | Obfuscation is applied to programmatic defenses, which in turn impede de-obfuscation via dynamic analysis. ||

### Device Binding

| # | Description | R |
| --- | --- | --- |
| **8.11** | The app implements a 'device binding' functionality using a device fingerprint derived from multiple properties unique to the device. ||
| **8.10** | The app implements a 'device binding' functionality using a device fingerprint derived from multiple properties unique to the device. ||

### Impede Comprehension

| # | Description | R |
| --- | --- | --- |
| **8.12** |All executable files and libraries belonging to the app are either encrypted on the file level and/or important code and data segments inside the executables are encrypted or packed. Trivial static analysis does not reveal important code or data. ||
| **8.13** | If the goal of obfuscation is to protect sensitive computations, an obfuscation scheme is used that is both appropriate for the particular task and robust against manual and automated de-obfuscation methods, considering currently published research. The effectiveness of the obfuscation scheme must be verified through manual testing. Note that hardware-based isolation features are preferred over obfuscation whenever possible. ||
| **8.11** |All executable files and libraries belonging to the app are either encrypted on the file level and/or important code and data segments inside the executables are encrypted or packed. Trivial static analysis does not reveal important code or data. ||
| **8.12** | If the goal of obfuscation is to protect sensitive computations, an obfuscation scheme is used that is both appropriate for the particular task and robust against manual and automated de-obfuscation methods, considering currently published research. The effectiveness of the obfuscation scheme must be verified through manual testing. Note that hardware-based isolation features are preferred over obfuscation whenever possible. ||

## References

Expand Down

0 comments on commit ba68e78

Please sign in to comment.