O'Reilly logo

Bulletproof Android™: Practical Advice for Building Secure Apps by Godfrey Nolan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

DexGuard

One of the best descriptions on the different levels of obfuscation comes from Christian Collberg’s paper, “A Taxonomy of Obfuscating Transformations,” which you can find at https://researchspace.auckland.ac.nz/bitstream/handle/2292/3491/TR148.pdf. A Java list of obfuscation classifications from the paper can be found in Table 2-1.

Image
Image

Table 2-1 Taxonomy of Obfuscations

There are four major categories of obfuscation: layout, control, data, and preventative. We’ve already seen a good example where the identifiers have been scrambled, which ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required