Android Security-code Security 4-Reverse tool confrontation
When you reverse-analyze Android apps, you'll typically use Apktool,baksmali/smali,dex2jar,androguard,
Jdgui, as well as IDA Pro. So consider making these tools fail to protect the APK when you decompile the APK, which
Most are open source, you can read its source code, analysis of its in the parsing APK, Dex and other files exist defects,
Use it when developing Android apps. Refer to the Tim strazzere Dex education:practicing Safe
Dex, the corresponding Demo, look at the snow on the Chinese translation , but many of these techniques have failed. Dexlabs's Dalvik
Bytecode obfuscation on Android introduces the technology of garbage bytecode insertion.
When using Apktool for repackaging, files with the suffix PNG are packaged in PNG format
, so if you intentionally change the file name of a non-PNG format file to a file that is suffixed with PNG when the project is developed,
You will get an error when you use Apktool for repackaging. This approach can be used to counter repackaging.
Transferred from: http://bbs.pediy.com/showthread.php?t=183116
Android Security-code Security 4-Reverse tool confrontation