反编译混淆的Java字节码 [英] Decompiling obfuscated java bytecode

查看:171
本文介绍了反编译混淆的Java字节码的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我在运行Java应用程序的平台上工作.这些应用程序经常被混淆,其中大多数使用ProGuard,这使得调试我们平台的问题非常困难.

I work on a platform which runs Java apps. Those apps are often obfuscated, most of them using ProGuard, which makes debugging issues with our platform very difficult.

当前,我正在使用JD( http://java.decompiler.free.fr/ )反编译这些应用. JD做得不错,但是有时生成的代码太难理解了.

Currently I'm using JD (http://java.decompiler.free.fr/ ) to decompile it those apps. JD does a decent job, but sometimes the generated code is too difficult to understand.

发生这种情况的主要原因是,混淆工具利用了JVM字节码的较少约束规范来生成有效的字节码,该字节码没有映射回有效的Java代码(例如:积极的重载).

This appears to happen mainly because obfuscation tools exploit the less constrained spec of JVM Bytecode to produce valid bytecode which doesn't map back to valid Java code (example: aggressive overloading).

所以,我的问题是:是否有专门用于处理混淆后的字节码的反编译器?

So, my question is: is there a decompiler built especially to deal with obfuscated bytecode?

推荐答案

我怀疑任何反编译器都会这样做.但是,您可以使用 ASM 之类的东西来实现自定义字节码转换并重命名重载的方法和变量名.

I doubt any decompilers do that. However you could implement custom bytecode transformation and rename overloaded method and variable names using something like ASM.

这篇关于反编译混淆的Java字节码的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆