Post a new post
Open the left side

Big data requires more security

[Copy Link]
386 0

Register now, make more friends, enjoy more functions, and let you play in the community easily.

You need Sign in Can be downloaded or viewed without an account?Register Now WeChat login

x
APPAfter the project development is completed, when the testers test it, there is noBugUsually, the company has some technical personnel responsible for publishing and promotingAPPProduct. This is a typical formal large company that has dedicated marketing and technical maintenance departmentsAPPEncrypt and obfuscate packaging, such as usingAntEncryption, as well as using third-party encryption methods such as Love plus Confidential. PresumablyAPPWhy do products need encryption confusion? As developers and bosses, we all understand the implicit aspects. However, there is another way to package confusionAPPThat's it android adopteclipseObfuscated code pack + proguard Method.
What is code obfuscation?
Code obfuscation is the act of converting program code into a functionally equivalent but difficult to read and understand form. For example, changing the names of various elements in the code, such as variables, functions, and classes, to meaningless names makes it difficult for the decipherer to guess their purpose based on the names while reading, increasing the difficulty of decompilation.
Ways of code obfuscation
In order to avoid piracy and improve application security, technicians have implemented aAPPCode confusion occurred. chart1It is a comparison of code structure before and after code obfuscation. The screenshot on the right shows some class names in the source code file that have been changed to names named with English letters, making it difficult for the decipherer to understand their specific meanings while reading.
Big data requires more security383 / author:gold123 / PostsID:291924

The advantages and disadvantages of code confusion
This code obfuscation method is simple and easy to operate. But this can also bring difficulties to the debugging work of developers, who usually need to keep the original and unambiguous code for debugging. Due to the irreversibility of confusion, some information that does not affect normal operation will be permanently lost during the confusion process, and the loss of this information will make the program more difficult to understand.
Code obfuscation cracking
Although code obfuscation was done, it only caused changes to the class names and some variable names of the source code, increasing the difficulty for decipherers to read and not truly preventing decompilation. The following is a confusion about the Nine Heavens LegendAPPDemo the process of cracking and inserting malicious advertisements. Firstly, useapktoolDecompile with tools to obtainsmaliCode file, locate the main file againActivtiyThe code, mainActivityCan be accessed fromAndroidManifestFound in the file. The Lord of the Nine Heavens LegendActivityFound ascom.tp.ttgame.jiutian.JiuTian。
The following figure shows the processingcom\tp\ttgame\jiutian\JiuTian.smaliInonCreateFunction, add a screenshot of the initialization code for the rice advertisement to it.
Big data requires more security209 / author:gold123 / PostsID:291924

Add againbannerInsert the function into it and place it in theonResumeCalled in function
Big data requires more security937 / author:gold123 / PostsID:291924
Big data requires more security526 / author:gold123 / PostsID:291924

This completes the modification of the code section. Finally, make the necessary modificationsAndroidManifestThe necessary configuration for rice advertising needs to be included in the file.
Big data requires more security716 / author:gold123 / PostsID:291924
Big data requires more security25 / author:gold123 / PostsID:291924

Finally, there will be rice advertisementsSDKTranslate the content intosmaliAnd integrate it with the Nine Day ProgramsmaliMerge. useapktoolThe program generated after repackaging is a pirated application containing rice advertisements. chart7It is the interface after launching the pirated application, where you can see the added content of the rice advertisement in the lower right corner.
Similarly, the cracker can also copy the genuine versionAPPReplace the advertisement in, so that when the user downloads the pirated application and clicks on the advertisement, the advertising revenue directly goes into the cracker's pocket. It is important that most advertisements in pirated applications are malicious, which can download programs without the user's knowledge, causing traffic consumption and tariff losses, affecting the user experience and damaging the legitimate versionAPPOur brand image. So, simply obfuscating code cannot fully guarantee application security.
How to avoid mobile phonesAPPCracked and pirated?
Currently, more and more developers are choosing to use Love Encryption to protect application security. Is this method reliable? Let me demonstrate it to you below. The following picture shows the legend of the Nine HeavensAPPComparing the code structure before and after reinforcement protection, it can be seen that the reinforced code files in the screenshot on the right have been hidden and only the reinforced protection program has been retained. Crackers cannot find the true code of the source program during decompilation, which effectively avoids the need for mobile phonesAPPCracked and pirated.
Big data requires more security89 / author:gold123 / PostsID:291924

Besides being able to access mobile phonesAPPIn addition to protecting the code, the reinforced code also has functions such as anti debugging, anti tampering, anti theft, and anti reverse, which can effectively prevent code injection, prevent malicious tampering behavior of game cheats or Trojan programs, prevent applications from being repackaged at the root, and prevent the production of pirated applications. Avoid mobile phonesAPPCracked and pirated versions not only require the use of professional third-party reinforcement products, but also require developers to improve their security awareness, such as writing code in a standardized manner and reducing program vulnerabilities; Fix vulnerabilities in a timely manner and do not give attackers an opportunity to exploit them.
If you require data encryptioniOSEncryption reinforcement, Android encryption reinforcement, data encryptionCommunication encryptionFor source code protection, virtualization protection, anti decompilation, and anti debugging services, please go to the several dimensional security encryption official website.[sub][/sub][sup][/sup][strike][/strike]
"Small gifts, come to Huiyi to support me"
No one has offered a reward yet. Give me some support
www.fx678.com
comiis_nologin
You need to log in before you can reply Sign in | Register Now WeChat login

Point rules of this version

more

Customer Service Center

238-168-2638 QQcustomer service Monday to Friday 20:00-24:00
Quick reply Back to top Back to list