如何prevent扭转一个Android APK文件的工程,以确保code? [英] How to prevent reverse engineering of an Android APK file to secure code?

查看:125
本文介绍了如何prevent扭转一个Android APK文件的工程,以确保code?的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我有一个应用程序源及其 APK 文件。现在我想prevent被反向工程这个APK文件。如果有可能,以确保从逆向工程我的应用程序,什么是用于该步骤在我的编码或任何库可循?

解决方案
  

现在我想prevent被反向工程这个APK文件。

这是不可能的,不好意思。

  

如果有可能,以确保从逆向工程我的应用程序,什么是用于该步骤在我的编码或任何库可循?

ProGuard的,正确的配置,将模糊处理code。 DexGuard,ProGuard的一个商业扩展版本,可帮助多一点。但是,您的code仍可转换成 smali ,和开发人员的逆向工程经验,将能学到什么,你从做 smali code。

如果你不想让别人看到你的code,不存储code自己的设备上。

I have an app source and its APK file. Now I want to prevent this APK file from being reverse engineered. If it is possible to secure my app from reverse engineering, what are the steps to follow in my coding or any library is used for that?

解决方案

Now I want to prevent this APK file from being reverse engineered.

That is impossible, sorry.

If it is possible to secure my app from reverse engineering, what are the steps to follow in my coding or any library is used for that?

ProGuard, properly configured, will obfuscate your code. DexGuard, a commercial extended version of ProGuard, may help a bit more. However, your code can still be converted into smali, and developers with reverse-engineering experience will be able to learn what you do from that smali code.

If you do not want others seeing your code, do not store that code on their device.

这篇关于如何prevent扭转一个Android APK文件的工程,以确保code?的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆