Runtime Defense
Reduce runtime manipulation and reverse engineering.
CONTROL MAPPINGS AVAILABLE
OWASP MASVS, ENISA MAS, PCI DSS 4.0, PCI MPoC (where applicable)
DESIGNED FOR HIGH-RISK AND HIGH VALUE MOBILE APPS
INTEGRATION SUPPORT & DOCUMENTATION
Detect and respond to common compromise techniques such as root/jailbreak, emulators, debugging, hooking/instrumentation, overlays, synthetic input, sideloading, and suspicious input methods.
Increase resistance to reverse engineering and extraction by encrypting sensitive components (including Android DEX), protecting assets, and validating integrity at runtime.
Store keys, credentials, and tokens in secure storage (hardware‑backed when available), with PIN/password/biometric gating and anti‑cloning patterns.
Harden client‑to‑server communication with certificate pinning and rotation patterns, optional request/payload protection for high‑risk calls, and protections for tokens/cookies in transit and at rest.
Create and sign DPoP proofs (RFC 9449) so requests can prove key possession - not just present a bearer token.
Implement crypto agility (including PQC‑ready options) and support key generation / signing patterns for use cases such as strong customer authentication and transaction signing flows.
Reduce runtime manipulation and reverse engineering.
Protect secrets, sessions and sensitive flows.
Support compliance and evidence needs.
Cryptomathic Mobile Application Security Suite is a cutting-edge in-app security solution designed for the highest level of data protection in today’s mobile world. It combines proactive defense mechanisms with multiple, mutually reinforcing security layers to ensure comprehensive protection.
Our mobile application security suite provides a robust security framework implementation that aligns closely with the most widely adopted mobile security frameworks OWASP and ENISA. Our mobile application security suite will give you a full 94% compliance with both mobile focused frameworks with a single security solution.
Hardens apps against tampering and instrumentation.
Protects secrets and sessions on the device.
Strengthens network/API communication.
Enables risk-based responses when paired with server-side components.
MASC Core embeds hundreds of runtime application self‑protection checks directly into the app. These checks detect compromise signals while the app is running and can trigger configurable responses (e.g., step‑up, restrict, block, or report - depending on your implementation and policy model).
Capabilities:
Protecting code and bundled assets helps reduce the impact of reverse engineering, repackaging, and extraction of embedded material - especially in high‑value regulated apps.
Capabilities:
Mobile apps place sensitive assets on public devices. MASC Core helps protect secrets and sessions with secure storage patterns and device‑bound controls.
Capabilities:
All mobile apps depend on APIs. MASC Core hardens the network layer to improve confidentiality and integrity - especially for high‑risk calls.
Capabilities:
Certificate pinning with rotation/update patterns
Hardened TLS / certificate validation behavior (avoid reliance on brittle trust assumptions)
Session binding options to reduce replay and token misuse (architecture dependent)
Optional message‑level payload protection for high‑risk operations
OAuth 2.0 token protection and cookie shielding
WebSocket support and WebView routing controls (as supported)
Bearer tokens can be copied and replayed. With DPoP (RFC 9449), the app can present a cryptographic proof that it holds the right private key at the time of the request, making stolen tokens significantly harder to abuse.
MASC Core can generate and sign DPoP proofs and can be integrated with your authorization infrastructure (and/or server‑side verification components) to validate proof objects and enforce policy.
MASC Core supports cryptographic operations used in protected mobile flows - designed to help teams adopt crypto agility and reduce long‑term dependency on fixed algorithms.
Capabilities:
Crypto agility patterns (including PQC‑ready options, depending on deployment requirements)
Key generation and signing flows for transaction security / dynamic linking type use cases (program dependent)
Signing and encryption utilities integrated into protected flows, without embedding sensitive key material in app code
Need centralized policy and server‑side verification for these signals? Explore MASC Assurance
CI/CD integration:
Native SDKs for Android and iOS with tutorials, API docs, and sample apps
Separate development / testing / production build profiles
ConfPacker for encrypted YAML configuration (if you keep this, add a 6–10 word explainer: “encrypts and packages runtime configuration”)
Gradle and Xcode integration with prebuilt configs for dev/prod
Designed for minimal code changes and low overhead (benchmarks available on request)
Compatible with server‑side verification services when used (deployment model varies)
Android: API 24 (Android 7.0) and up
iOS: iOS 9 and up
Frameworks supported:
Native: Kotlin, Java, Swift, Objective‑C
Hybrid (scope documented): React Native, Flutter, Cordova, Kotlin Multiplatform
Protect high-value payment and onboarding flows against tampering and instrumentation, making it harder for attackers to abuse compromised devices and reducing opportunities for fraud and account opportunities.
Protect stored identity data and credentials against extraction, cloning and tampering, reducing the risk of account takeover, fraudulent identity use and compromise of high-trust digital ID schemes.
Native mobile apps live on devices you do not control. Once installed, they can be tampered with, instrumented or cloned by attackers looking for weaknesses in your defences.
If you operate in a regulated environment, those apps are a direct front-end to financial data, identity information, health records or other sensitive services.
Basic protections and generic vendor add-ons are not enough; a single compromise can trigger fraud losses, regulatory scrutiny and long-term damage to customer trust.
MASC Core adds a hardened security layer inside the app: layered runtime protection, code and asset protection, secure storage for keys and tokens, and hardened network flows. It helps you spot and respond to manipulation attempts before they become incidents, and makes it significantly harder for attackers to bypass or “cheat” your security controls.
MASC Core drops into existing mobile delivery pipelines with minimal code changes. Native SDKs, clear configuration patterns and CI/CD-friendly tooling make it straightforward for development, security and operations teams to embed strong in-app protection without slowing releases or redesigning their architecture.
Android & iOS native SDK
Works with common build tools (Gradle, Xcode)
Strengthens network/API communication.
Enables risk-based responses when paired with server-side components.
Tier 1 European Bank – Mobile Banking App
To meet customer demand, a large European bank launched a feature-rich mobile banking app for their retail customers.
Securing Mobile Banking Apps With MASC
Understand the threat landscap, how MASC's evolutionary security strategy can overcome them and provide 360º protections against attacks.
BOSA's Mobile Identity Wallet Transformation
By leveraging Cryptomathic's Mobile App Security Core (MASC), BOSA successfully enhanced the security and scalability of its mobile identity wallet.
Selecting The Right Mobile App Security Solution
Explore the mobile security threat landscape and learn how to evaluate and select the right layered, adaptive application security solution.
What is mobile app protection?
Mobile app protection is a set of security controls built into your mobile application to defend it against tampering, reverse engineering, runtime attacks and data theft on untrusted devices. It typically combines runtime application self-protection (RASP), code and asset protection, secure storage for keys and tokens, and hardened network/API communication so that sensitive operations remain protected even when the device or network cannot be trusted.
Does it support iOS and Android?
Yes. MASC Core is a native SDK for both iOS and Android, with support for common languages and frameworks (Kotlin/Java, Swift/Objective-C and selected hybrid frameworks such as React Native and Flutter, as documented).
Does it impact performance?
MASC Core is designed for low overhead in real world apps. The actual performance impact depends on which protections you enable, how frequently checks run, and device conditions, but profile presets and integration guidance are provided so teams can balance security depth with responsiveness.
How does it help with OWASP MASVS / ENISA / PCI MPoC?
MASC Core implements controls that align with key mobile security requirements from OWASP MASVS, ENISA Mobile Applications Security and, where applicable, PCI DSS / PCI MPoC (for example, runtime protection, integrity checks, secure storage and hardened communications).
MASC is built to support regulated mobile programs that need defensible controls and evidence - not just “best effort” protections.
Does Core slow down the app?
Core is designed for low latency. Performance impact depends on enabled protections and device conditions; recommended profile configurations are available during onboarding.
Do we need to redeploy to change security policies?
Core supports configurable behaviors. For centralized, over‑the‑air policy updates and backend trust decisions, pair Core with our server‑side verification components, MASC Assurance.
Can we use our own crypto keys?
Yes. Key management models depend on your architecture; integrations can support customer‑managed keys and HSM‑backed governance where required.
It also exposes a larger attack service, which requires a very particular skillset to better manage increased risk and protect against financial devastation or reputational disaster.
Our unrivalled experts craft mobile protection solutions that deliver the highest levels of security by design. We don’t just provide a shield, or an add-on; our mobile protection gives you true in-app security.
Native mobile apps provide a superior user experience of native apps but escape your control once downloaded, opening possibilities for exploitation. Unauthorized access to sensitive information on mobile devices can not only make customers and businesses vulnerable. It could pose national security risks. If a passport stored in a digital wallet is compromised, it affects the ability of border force agents to correctly identify someone crossing the border. Bad actors could illegitimately cross nations or genuine citizens could be denied entry. Mobile app protection is not just a question of convenience. It is about managing all modern security risks to keeping sensitive data safe. If you work in highly regulated sectors, your apps will contain financial, health, personal or similarly sensitive data. Default vendor solutions are not enough and breaches don’t just threaten to halt your revenue streams, they can destroy your reputation and lose you customers. Work with the global specialists to set threat parameters exactly as you wish and provide the highest levels of protection.