reverse engineering protection
I read in a sample of the book Decompiling Android by Nolan Godfrey that the usage of goto
method can make the source code produce non readable code when decompiling the apk.
The goto
method is unused in Java though..So how can someone make use of this?
Are there any other methods someone can use to make the decompiled code non readable?
(Please do not comment or answer that no matter what I do the CIA will always be able to fully reverse my app. And obviously I'm past the point of using Proguard, etc).
You can try ProGuard for basic protection, or DexGuard for full protection and encryption: https://www.guardsquare.com/en/dexguard
Comparision: https://www.guardsquare.com/en/blog/dexguard-vs-proguard
However, on larger project using many external libs, configuration may be not straighforward
链接地址: http://www.djcxy.com/p/90714.html上一篇: 在Android模拟器中切换到横向模式
下一篇: 逆向工程保护