如何prevent A"拆卸和QUOT;我的apk [英] How to prevent a "teardown" of my apk

查看:197
本文介绍了如何prevent A"拆卸和QUOT;我的apk的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

根据该<一个href=\"http://www.androidpolice.com/2012/10/11/apk-teardown-the-play-store-is-getting-a-built-in-malware-scanner-theres-more-wish-list-progress-and-more/\"相对=nofollow>链接,Android的警察能够拆卸的谷歌游戏APK,清晰地阅读的字符串文件。我以为有办法prevent此使用 ProGuard的,但确实它工作呢?我记得今年看完I / O大会上,他们提到一些关于加密您的应用程序,我相信。我没有看过任何治愈了我对派出不能反编译/解构或任何一个应用程序的焦虑。任何有经验,可以保证这个(ProGuard,并将这种加密的东西)?


解决方案

  

我以为有办法prevent这种使用ProGuard,但它的工作原理呢?


ProGuard的混淆code。它并没有对资源文件什么。它甚至没有在code加密的字符串常量。

DexGuard ,ProGuard的一个商业分支,似乎加密字符串常量,虽然我什么也看不到有关资源

此外,没有这将帮助很多。由于Hewgill先生在评论中指出,按照定义,一切都已经是可见的运行。

According to this link, "Android Police" were able to teardown the Google Play apk and clearly read the strings file. I thought there were ways to prevent this using proguard, but does it work well? I remember watching the I/O conference this year and they mentioned something about encrypting your app I believe. I haven't read anything that has cured my anxiety about sending out an app that can not be decompiled/deconstructed or anything. Can anyone with experience vouch for this (proguard and this encryption thing)?

解决方案

I thought there were ways to prevent this using proguard, but does it work well?

ProGuard obfuscates code. It does not do anything with resource files. It does not even encrypt string constants in code.

DexGuard, a commercial offshoot of ProGuard, appears to encrypt string constants, though I see nothing about resources.

Moreover, none of this will help much. As Mr. Hewgill points out in a comment, by definition, everything has to be visible to run.

这篇关于如何prevent A&QUOT;拆卸和QUOT;我的apk的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
相关文章
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆