Skip to main content
Technology 7 min read

Why Keyra Uses RASP Technology to Protect Your Assets

Discover how Runtime Application Self-Protection (RASP) actively defends your Keyra wallet against rooting, jailbreaking, and tampering.

Security shield with real-time threat detection and protection layers

Why Keyra Uses RASP Technology to Protect Your Assets

Key Takeaways

  • RASP (Runtime Application Self-Protection) monitors your app in real-time for security threats
  • Detects rooting, jailbreaking, debugging attempts, and app tampering
  • When critical threats are detected, Keyra automatically wipes sensitive keys
  • Unlike static security, RASP adapts to new attack vectors dynamically
  • Keyra is one of the few mobile wallets with production-grade RASP integration

Introduction

Your mobile phone is a powerful computer—but it’s also a computer you take everywhere, install random apps on, and connect to public WiFi. For a cryptocurrency wallet, this creates unique security challenges.

Traditional security measures like encryption protect your data at rest. But what happens when a sophisticated attacker modifies your device’s operating system or injects code into your running app?

That’s where RASP comes in.

What Is RASP?

RASP stands for Runtime Application Self-Protection. Unlike perimeter security (firewalls, VPNs) or static analysis, RASP operates inside your application, monitoring every execution in real-time.

Think of it like this:

Security TypeAnalogyLimitation
FirewallCastle wallsCan be bypassed once inside
EncryptionLocked safeDoesn’t help while safe is open
Static AnalysisPre-inspectionCan’t detect runtime attacks
RASPPersonal bodyguardProtects you everywhere

RASP technology is used by major financial institutions, banking apps, and now—Keyra.

The Threats RASP Protects Against

1. Rooting and Jailbreaking

When a device is rooted (Android) or jailbroken (iOS), the operating system’s security model is compromised:

  • Other apps can access protected data
  • Malware can run with elevated privileges
  • Screen overlays can capture your input
  • Memory can be read by malicious processes

Keyra’s response: Detects rooted/jailbroken devices and alerts users to the elevated risk. Critical security features may be disabled on compromised devices.

2. Debugging Attacks

Debuggers allow attackers to:

  • Pause your app’s execution
  • Inspect memory for private keys
  • Modify values in real-time
  • Bypass authentication checks

Keyra’s response: Detects attached debuggers and terminates sensitive operations immediately.

3. App Tampering

Modified versions of apps (repackaged APKs) might:

  • Remove security checks
  • Include keyloggers
  • Send data to attackers
  • Display fake interfaces

Keyra’s response: Verifies app integrity at runtime. If tampering is detected, the app refuses to operate with cryptographic functions.

4. Overlay Attacks

Malicious apps can draw invisible overlays on top of your wallet:

  • Fake “Confirm” buttons that redirect transactions
  • Phishing screens that capture seed phrases
  • Invisible input fields stealing passwords

Keyra’s response: Detects screen overlay attacks and pauses sensitive operations until overlays are removed.

5. Emulator Detection

Attackers use emulators to:

  • Analyze app behavior in controlled environments
  • Automate credential theft at scale
  • Test attack vectors without real devices

Keyra’s response: Detects emulator environments and restricts functionality.

How RASP Works in Keyra

Keyra’s RASP implementation operates on multiple layers:

┌─────────────────────────────────────────┐
│           Application Layer              │
│  ┌─────────────────────────────────────┐ │
│  │         RASP Security Agent          │ │
│  │  • Integrity verification            │ │
│  │  • Debugger detection                │ │
│  │  • Root/jailbreak checks             │ │
│  │  • Overlay detection                 │ │
│  │  • Memory protection                 │ │
│  └─────────────────────────────────────┘ │
│                    ↓                     │
│  ┌─────────────────────────────────────┐ │
│  │        Rust Cryptographic Core       │ │
│  │  • Private key operations            │ │
│  │  • Transaction signing               │ │
│  │  • Key derivation                    │ │
│  └─────────────────────────────────────┘ │
└─────────────────────────────────────────┘

The Decision Engine

When a threat is detected, Keyra’s RASP engine makes real-time decisions:

Threat LevelExampleAction
LowRunning on emulatorWarning displayed
MediumDebugger attachedCryptographic ops disabled
HighRoot detected + debuggerSession terminated
CriticalActive tamperingKeys wiped from memory

The Automatic Key Wipe

The most powerful response in Keyra’s arsenal is the automatic key wipe. When multiple critical indicators suggest an active attack:

  1. All private keys are immediately cleared from memory
  2. Encrypted key storage is locked
  3. User is notified of the security event
  4. Recovery requires re-authentication

This means even if an attacker gains code execution, they find… nothing. The keys are already gone.

Why Other Wallets Don’t Have RASP

RASP integration is complex and expensive:

  • Requires deep platform expertise (both iOS and Android)
  • Increases app size and startup time
  • Needs constant updates as attack vectors evolve
  • Many wallet teams prioritize features over security

At Keyra, we believe security is the feature. You can’t enjoy DeFi gains if your wallet gets drained.

RASP + Keyra’s Other Defenses

RASP is just one layer of Keyra’s defense-in-depth strategy:

LayerTechnologyPurpose
StorageAES-256 EncryptionProtect keys at rest
CodeRust CoreMemory-safe cryptography
RuntimeRASPActive threat detection
TransactionAI SimulationPrevent malicious transactions
AuthenticationBiometricsPrevent unauthorized access

Frequently Asked Questions

Will RASP flag my device if I use custom ROMs?
Custom ROMs often trigger root detection because they modify system-level components. While you can still use Keyra, you may receive warnings about reduced security. For maximum protection, we recommend stock operating systems with the latest security patches.
Does RASP drain my battery?
Keyra's RASP implementation is highly optimized. Security checks are event-driven rather than continuous, meaning they only run when necessary (app launch, transaction signing, etc.). The battery impact is negligible—less than 1% of daily usage.
What happens if RASP wrongly detects a threat?
False positives are rare but possible, especially on heavily modified devices. If you experience unexpected security warnings, contact our support team. Your funds remain safe—RASP errs on the side of caution, which may inconvenience users but never puts assets at risk.

Ready to Secure Your Future?

Join thousands of users who trust Keyra for their multi-chain self-custody.

Download Keyra Now
Non-Custodial
Open Source
Share:

Stay ahead in Web3

Get the latest security insights, DeFi guides, and Keyra updates delivered to your inbox.