Application Security

Addressing OWASP MASVS-R with Jscrambler

July 28th, 2022 | By Jscrambler | 4 min read

OWASP MASVS-R, the Mobile Application Security Verification Standard, is an optional protective layer for impeding reverse engineering and tampering.

In this article, see how to address OWASP MASVS-R with Jscrambler, as this regulation helps developers increase the security of mobile apps by providing a list of requirements an application should adhere to.


The MASVS, being a standard, provides a list of requirements that an application should adhere to. There are two security levels: MASVS-L and MASVS-R.


The first security level is divided into L1, which contains generic security requirements that are recommended for all apps, and L2, which contains requirements for defense-in-depth.

2. Masvs-R

MASVS-R is the second security level and consists of a set of reverse engineering requirements that are useful for providing client-side defenses.

This type leads us to address the issue of client-side security in more depth, defining how Jscrambler can help adhere to each regulation defined by OWASP.

Even though the MASVS-R is a separate level for client-side attacks, that doesn’t mean that L1 and L2-compliant apps can’t employ the R level as well.

Tampering, debugging, and reverse engineering of the application’s source code are some of the attacks covered by OWASP’s MASVS-R.

This kind of protection is especially important for hybrid mobile apps since the application packages will normally contain a JavaScript bundle file containing the app’s logic.

It is important to note that these applications are stored on the end user's device.

Addressing OWASP MAVS-R with Jscrambler solution

MASVS-R covers attacks such as tampering, debugging, and reverse engineering that can be performed on the app’s source code.

This client-side JavaScript can easily be targeted, as anyone can debug and even modify it.

Companies’ proprietary algorithms and logic end up running in an adversarial environment, which opens the door to a series of attacks, including automated abuse, piracy, intellectual property theft, and data exfiltration.

This highlights the importance of adding a security layer to reduce the app’s attack surface.

OWASP recommends adopting the R level together with L1 or L2. In the table below, see how to address MASVS-R with Jscrambler, both at the app's JavaScript layer and in its native code.


OWASP Description

How Jscrambler Addresses


The app detects and responds to the presence of a rooted or jailbroken device either by alerting the user or terminating the app.

Jscrambler’s Root/Jailbreak detection feature detects these risky devices and can alert the user, terminate the app, or block features.


The app prevents debugging and/or detects and responds to a debugger being attached. All available debugging protocols must be covered.

Provides multiple anti-debugging features, including Self-Defending and Dead Objects, which actively prevent debugging at runtime, breaking the app when a debugger is opened.


The app detects and responds to tampering with executable files and critical data within its own sandbox.

Jscrambler’s Self-Defending and Self-Healing features prevent tampering attempts at runtime, both by breaking the app or only allowing the correct code to run.


The app detects and responds to the presence of widely used reverse engineering tools and frameworks on the device.

Jscrambler’s Code Hardening feature is built-in for every code protection and provides up-to-date protection against all reverse engineering tools.


The app detects and responds to being run in an emulator.

Jscrambler’s Code Hardening feature provides anti-emulator capabilities. It detects if the source code is being executed by, e.g., Facebook's (Meta) pre-pack custom JavaScript engine.


The app detects and responds to tampering with the code and data in its own memory space.

Jscrambler’s Self-Defending and Self-Healing features prevent tampering attempts at runtime. The Memory Protection feature ciphers sensitive data using cryptographic algorithms, preventing values stored in memory from being accessed and tampered with at runtime.


The app implements multiple mechanisms in each defense category (8.1 to 8.6). Note that resiliency scales with the amount and diversity of the originality of the mechanisms used.

Under the hood, Jscrambler uses multiple defense mechanisms, including different ways to detect debugging and tampering attempts and to detect if the device is rooted or jailbroken.


The detection mechanisms trigger responses of different types, including delayed and stealthy responses.

Jscrambler combines different approaches to prevent tampering and debugging attempts, including customizable countermeasures and real-time security alerts.


Obfuscation is applied to programmatic defenses, which in turn impede de-obfuscation via dynamic analysis.

Jscrambler’s polymorphic obfuscation is applied to all anti-tampering and anti-debugging defenses, making it extremely hard for attackers to de-obfuscate the code both using static and dynamic analysis.


The app implements device binding functionality using a device fingerprint derived from multiple properties unique to the device.

Device binding can be obtained using Jscrambler’s integrations with native code protection technologies.


All executable files and libraries belonging to the app are either encrypted on the file level, and important code and data segments inside the executables are encrypted or packed. The trivial static analysis does not reveal important code or data.

While Jscrambler obfuscates JavaScript source code, it can also encrypt native code through dedicated integrations with native code protection technologies.


If the goal of obfuscation is to protect sensitive computations, an obfuscation scheme is used that is both appropriate for the particular task and robust against manual and automated de-obfuscation methods. The effectiveness of the obfuscation scheme must be verified through manual testing.

Jscrambler provides over 35 different transformations, along with polymorphic behavior, to greatly improve the resiliency of the protected source code against manual and automated de-obfuscation. The effectiveness of the obfuscation can be analyzed by following this checklist.


As a defense in depth, in addition to having solid hardening of the communicating parties, application-level payload encryption can be applied to further impede eavesdropping.

This level of encryption can be obtained using Jscrambler’s integrations with native code protection technologies.

This information is important to retain, not only for reasons of compliance but also to ensure your apps are completely protected against client-side threats.

If you are building mobile apps with JavaScript, you should secure your source code against theft and reverse engineering. Start a free Jscrambler trial and protect your code in 2 minutes!


The leader in client-side Web security. With Jscrambler, JavaScript applications become self-defensive and capable of detecting and blocking client-side attacks like Magecart.

View All Articles

Must read next

Application Security

Exploring the OWASP Top 10 By Exploiting Vulnerable Node Applications

Having development teams aware of application security threats is crucial to avoid common exploits. A great way to learn is by exploiting vulnerable apps.

September 17, 2019 | By Karan Gandhi | 9 min read

Application Security

MASVS & MSTG: A Quick Guide To Mobile App Security

The MASVS and MSTG guides by OWASP provide guidance on protecting mobile apps against attacks. Let's explore them with a practical approach.

January 20, 2021 | By Karan Gandhi | 9 min read

Section Divider

Subscribe to Our Newsletter