diff --git a/Document/0x15-V8-Resiliency_Against_Reverse_Engineering_Requirements.md b/Document/0x15-V8-Resiliency_Against_Reverse_Engineering_Requirements.md index 9c0ba2424..c0a08922b 100644 --- a/Document/0x15-V8-Resiliency_Against_Reverse_Engineering_Requirements.md +++ b/Document/0x15-V8-Resiliency_Against_Reverse_Engineering_Requirements.md @@ -30,21 +30,20 @@ The following considerations apply: | **8.6** | The app detects, and responds to, tampering the code and data in its own memory space. | ✓ | | **8.7** | The app implements multiple mechanisms in each defense category (8.1 to 8.6). Note that resiliency scales with the amount, diversity of the originality of the mechanisms used. | ✓ | | **8.8** | The detection mechanisms trigger responses of different types, including delayed and stealthy responses. | ✓ | -| **8.9** | All executable files and libraries belonging to the app are either encrypted on the file level and/or important code and data segments inside the executables are encrypted or packed. Trivial static analysis does not reveal important code or data. | ✓ | -| **8.10** | Obfuscation is applied to programmatic defenses, which in turn impede de-obfuscation via dynamic analysis. | ✓ | +| **8.9** | Obfuscation is applied to programmatic defenses, which in turn impede de-obfuscation via dynamic analysis. | ✓ | ### Device Binding | # | Description | R | | --- | --- | --- | -| **8.11** | The app implements a 'device binding' functionality using a device fingerprint derived from multiple properties unique to the device. | ✓ | +| **8.10** | The app implements a 'device binding' functionality using a device fingerprint derived from multiple properties unique to the device. | ✓ | ### Impede Comprehension | # | Description | R | | --- | --- | --- | -| **8.12** |All executable files and libraries belonging to the app are either encrypted on the file level and/or important code and data segments inside the executables are encrypted or packed. Trivial static analysis does not reveal important code or data. | ✓ | -| **8.13** | If the goal of obfuscation is to protect sensitive computations, an obfuscation scheme is used that is both appropriate for the particular task and robust against manual and automated de-obfuscation methods, considering currently published research. The effectiveness of the obfuscation scheme must be verified through manual testing. Note that hardware-based isolation features are preferred over obfuscation whenever possible. | ✓ | +| **8.11** |All executable files and libraries belonging to the app are either encrypted on the file level and/or important code and data segments inside the executables are encrypted or packed. Trivial static analysis does not reveal important code or data. | ✓ | +| **8.12** | If the goal of obfuscation is to protect sensitive computations, an obfuscation scheme is used that is both appropriate for the particular task and robust against manual and automated de-obfuscation methods, considering currently published research. The effectiveness of the obfuscation scheme must be verified through manual testing. Note that hardware-based isolation features are preferred over obfuscation whenever possible. | ✓ | ## References