如何防止对 Android APK 文件进行逆向工程以保护代码? [英] How to prevent reverse engineering of an Android APK file to secure code?

查看:63
本文介绍了如何防止对 Android APK 文件进行逆向工程以保护代码?的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我有一个应用程序源及其 APK 文件.现在我想防止这个 APK 文件被逆向工程.如果可以保护我的应用免受逆向工程的影响,那么在我的编码或为此使用的任何库中应遵循哪些步骤?

I have an app source and its APK file. Now I want to prevent this APK file from being reverse engineered. If it is possible to secure my app from reverse engineering, what are the steps to follow in my coding or any library is used for that?

推荐答案

现在我想防止这个 APK 文件被逆向工程.

Now I want to prevent this APK file from being reverse engineered.

那是不可能的,抱歉.

如果可以保护我的应用免受逆向工程的影响,那么在我的编码或为此使用的任何库中应遵循哪些步骤?

If it is possible to secure my app from reverse engineering, what are the steps to follow in my coding or any library is used for that?

正确配置的 ProGuard 会混淆您的代码.DexGuard 是 ProGuard 的商业扩展版本,可能会有所帮助.但是,您的代码仍然可以转换为 smali,并且具有逆向工程经验的开发人员将能够从该 smali 代码中了解您所做的事情.

ProGuard, properly configured, will obfuscate your code. DexGuard, a commercial extended version of ProGuard, may help a bit more. However, your code can still be converted into smali, and developers with reverse-engineering experience will be able to learn what you do from that smali code.

如果您不希望其他人看到您的代码,请不要将该代码存储在他们的设备上.

If you do not want others seeing your code, do not store that code on their device.

这篇关于如何防止对 Android APK 文件进行逆向工程以保护代码?的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆