Skip to main content

Integrity Kit

Overview

Mobile devices based on the Android operating system are at risk of hardware tampering, which involves modifying a device's hardware to gain unauthorized access to its data or functionality. Hardware tampering can allow attackers to gain access to sensitive data, modify the device's firmware or software, turn the device into a surveillance tool, or disable critical functionality. These risks can be difficult to detect and bypass many of the security measures built into the Android operating system, making hardware tampering a significant security risk for mobile devices.

Datalogic Integrity Kit has implemented a strong mitigation strategy for the security risks associated with hardware tampering on Android-based mobile devices, that consist in three key components:

JTAG Locking System

Secure Boot Protection

Disable USB Data Transfer