Complications

Obfuscate Code

Is the process of modifying an executable so that it is no longer useful to a hacker but remains fully functional. While the process may modify actual method instructions or metadata, it does not alter the output of the program. To be clear, with enough time and effort, almost all code can be reverse engineered. However, on some platforms (such as Java, Android, iOS and .NET) free decompilers can easily reverse-engineer source code from an executable or library in virtually no time and with no effort. Automated code obfuscation makes reverse-engineering a program difficult and economically unfeasible.

Proguard

To obfuscate the code, use the Proguard utility, which makes these actions:

  • Removes unused variables, classes, methods, and attributes;

  • Eliminates unnecessary instructions;

  • Removes Tutorial information: obfuscate Androiddepuración code;

  • Renames classes, fields, and methods with unlegible names.

DEXGUARD

The enhanced commercial version of Proguard. This tool is capable of implementing the text encryption technique and renaming classes and methods with non-ASCII symbols.

Deobfuscation

It is based on powerful probabilistic graphical models learned from thousands of open source programs. Using these models, Deguard retrieves important information in Android APK, including method and class names, as well as third-party libraries. Deguard can reveal string decoders and classes that handle sensitive data in Android malware.

Last updated