absence of the corresponding function name and program comments, even if it is anti-compilation, it will be difficult to read. After the Android code is confused, the code is guaranteed to be secure, but protection is not comprehensive. Thanks for the "Love Encryption" they provide protection, including: Dex Shell Protection, DEX instruction dynamic load protection and advanced source code obfuscation prot
Complete analysis of Android security attack and defense, decompilation and obfuscation technologies (I)
I have been hesitant to write this article before. After all, it is not proud to decompile other programs. However, from a technical point of view, it is indeed a very useful skill to master the decompilation function, which may not be used very often, that's a headache. In addition, since someone else c
Overview of the Proguard Code obfuscation tool: code can be de-redundant compression, code optimization, code obfuscation and so on. The main application in Android is to confuse the code: the class name, method name, field name into difficult to read and understand names such as a,b,c or three-way, in order to prevent reverse engineering and be anti-compiled rea
.##toenableproguardtoshrinkandobfuscate yourcode,uncommentthis (availableproperties:sdk.dir,user.home): #proguard. Config=${sdk.dir}/tools/proguard/proguard-android.txt:proguard-project.txtproguard.config=${sdk.dir} /tools/proguard/proguard-android.txt:proguard-project.txt#projecttarget.target=android-16 project.properties The contents of the file, the blue text is the configuration information we need to add during the code
reprint: http://www.jianshu.com/p/7436a1a32891Brief introductionAs an Android developer, if you don't want to open up your app, you'll need to obfuscate the code before the app is released, making our code hard to read, even if it's deserialized. Confusing concept although easy, but a lot of beginners are just online search some molding confusion rules pasted into their own projects, and no confusion has a deep understanding. The purpose of this artic
Android code obfuscation considerations
Android code obfuscation often causes various problems. The following lists some precautions. if the jar package used in the dependent project is the same as the jar package in the project itself, delete the same jar package in the dependent project. native method to prevent
To prevent decompiling Android APKProgram, You needCodeFor obfuscation, if you have installed Android SDK 2.3, obfuscation of program code will become very simple. let's take a look at the specific steps. After installing sdk2.3, create an android project and you will find a
inconvenient to confuse Android code by manually adding Proguard for code obfuscation. After 2.3, Google has added this tool to the SDK's toolset. Specific path: Sdk\tools\proguard. When you create a new Android project, a proguard configuration file proguard.cfg appears under the root path of the project directory. In other words, we can use the simple configur
Obfuscation Packaging specification for Android applications1. Add the following proguard.config=proguard.cfg to the project file project.properties as follows:Target=android-8Proguard.config=proguard.cfgThis configuration is used by Eclipse to generate the proguard.cfg file in the project catalog , but this can only confuse projects that do not contain third-p
Overview:If you're still a student or have not uploaded apps in the App Store, I'm afraid that's not a deep feeling. In the enterprise, the confusion of Java code is a very important step, from the security point of view, code confusion, it is very important to prevent intentioned people from malicious tampering with the code. The following is the process of code obfuscation and cryptographic signing for Android
-Optimizationpasses 5
-Dontusemixedcaseclassnames: [classes of different types are not generated during obfuscation]-Dontskipnonpubliclibraryclasses [specify not to ignore non-public library classes. ]-Dontpreverify [no pre-verification]
-Verbose-Optimizations! Code/simplification/arithmetic ,! Field /*,! Class/merging/* [optimization]
-Keep public class * extends Android. App. Activity [unchanged without
Meituan Android resource obfuscation protection practicesPreface
APK security in Android applications has been criticized, and the market is filled with various cracked or Chinese applications, hackers can easily decompile, crack, and convert an APK using a cracking tool, in this way, the logic of the original code can be modified, new code can be added, resource
Description: as a programmer who has been writing c # for a few years, the java level is not flattering. However, a task recently requires java code and obfuscation. Baidu has been experimenting with the Internet for a whole day, and it is finally a little achievement. When obfuscation occurs, the gson package is used, which leads to Code failure after obfuscation
The previous article describes Android using Proguard code obfuscation technology, but for some of the items that introduced third-party jar packages may be in error when exporting, you need to do some research on the Proguard configuration file to solve the problem.
Proguard code obfuscation after exporting warning:can ' t find referenced class
Fir
To create a new project, the Android studio default turns off the code obfuscation switch in the Build.gradle file, as shown in the minifyenabled switch, so if you need to confuse the code, change false to True, Then add the specific obfuscation rules to the file Proguard-rules.pro.The buildtypes part of your own Build.gradle filebuildtypes {debug {Buildconfigfie
Android code obfuscation-so simpleA xxx.apk is submitted to the test,OK, go get a glass of water and look at the Web ~~~~~Well, suddenly I think it's better to give my code a bit more security,Remember to see the APK can be extracted directly, and then it is easy to decompile. javaLooked for, sure enough, all this is just a minute thing,1. Get classes.dex files; open the. apk file directly with the unzip so
Android code obfuscation 1 proguard. cfg. This is the proguard script required for obfuscation. The Code is as follows: [java] view plain-optimizationpasses 5-dontusemixedcaseclassnames-dontskipnonpubliclibraryclasses-dontpreverify-verbose-optimizations! Code/simplification/arithmetic ,! Field /*,! Class/merging/*-keep public class * extends
become very smart, but the introduction of the third-party jar still need to manually write obfuscation rulesCase: Introduction of Baidulbs_android.jar,android-support-v4.jar Two packagesProguard-project.txt Script Writing rules:The package contained within the #工程中含有第三方jar包-libraryjars Libs/android-support-v4.jar-libraryjars libs/baidulbs_android.jar# Project c
Write down and share it. It is too easy to decompile androidapk. If your SDK is old enough, you can bypass it. If the SDK is new, okay. Obfuscation of APK. It does not mean that ndk should at least encrypt Java, if it is not an open-source project.
The progurad provided by the latest R15 is 4.4. Anyway, I have a problem. What is the RP problem ?, I can't export the APK and keep prompting for errors. Conversion to Dalvik format failed with error 1
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.