obfuscation

How to include obfuscated jar file into a war file

北城以北 提交于 2019-12-06 14:52:46
In my web application, to obfuscate the source code, i used yGuard and got an obfuscated jar file. Now i placed this jar file into the WEB-INF/lib folder (as my jsp files have reference to the java files) and packaged the war file using below ant script : <?xml version="1.0" encoding="UTF-8"?> <project name="MyWebApp" default="war" basedir="."> <property file="build.properties" /> <property name="war-file-name" value="${project-name}.war" /> <property name="source-directory" value="src" /> <property name="classes-directory" value="WebRoot/WEB-INF/classes" /> <property name="web-directory"

Dynamic obfuscation by self-modifying code

◇◆丶佛笑我妖孽 提交于 2019-12-06 11:49:49
Here what's i am trying to do: assume you have two fonction void f1(int *v) { *v = 55; } void f2(int *v) { *v = 44; } char *template; template = allocExecutablePages(...); char *allocExecutablePages (int pages) { template = (char *) valloc (getpagesize () * pages); if (mprotect (template, getpagesize (), PROT_READ|PROT_EXEC|PROT_WRITE) == -1) { perror (“mprotect”); } } I would like to do a comparison between f1 and f2 (so tell what is identical and what is not) (so get the assembly lines of those function and make a line by line comparison) And then put those line in my template. Is there a

Proguard obfuscating does not work

拈花ヽ惹草 提交于 2019-12-06 08:53:32
问题 I'm trying to obfuscate my package names including that one of my used libraries. I use this build config in my gradle file: buildTypes { debug { versionNameSuffix "-Development" debuggable true runProguard true proguardFiles getDefaultProguardFile('proguard-android.txt'), 'proguard-rules.pro' } #... This is my proguard file: # Butterknife -dontwarn butterknife.internal.** -keep class **$$ViewInjector { *; } -keepnames class * { @butterknife.InjectView *;} # OrmLite uses reflection

Fail-safe way of round-tripping JVM byte-code to text-representation and back

岁酱吖の 提交于 2019-12-06 08:38:21
问题 I'm looking for a fail-safe way to round-trip between a JVM class file and a text representation and back again. One strict requirement is that the resulting round-tripped JVM class file is exactly functionally equivalent to the original JVM class file as long as the text representation is left unchanged. Furthermore, the text representation must be human-readable and editable. It should be possible to make small changes to the the text representation (such as changing a text string or a

Obfuscate Xamarin Application

萝らか妹 提交于 2019-12-06 07:55:16
问题 Is it possible to extract the code of a Xamarin Android application and inspect it? I am in last stages of one Application which would be soon released on Play Store. However, I am worried if the code could be extracted and looked at by other people. Please advise, how to secure my App from other people looking at the code for it. 回答1: Yes, it is possible to extract the code of a Xamarin.Android application. By default, the .dll files are just resources inside the APK, and they can be

ProGuard JNI Error

烈酒焚心 提交于 2019-12-06 07:16:28
I'm using ProGuard to obfuscate my Java Desktop application. When I launch the obfuscated JAR , I'm getting the following error: > java -jar program.jar Error: A JNI error has occurred, please check your installation and try again Exception in thread "main" java.lang.VerifyError: Expecting a stackmap frame at branch target 80 Exception Details: Location: MyMainClass.a(Ljava/lang/String;)Ljava/lang/String; @40: iflt Reason: Expected stackmap frame at this location. Bytecode: 0x0000000: 0406 7805 0882 8206 0882 0778 0482 0659 0x0000010: 7808 822a b600 0f59 bc05 0459 585f 0464 0x0000020: 5b3e

How safe is PHP bcompiler encoded code?

时光毁灭记忆、已成空白 提交于 2019-12-06 06:07:11
问题 I'm interested if anyone knows exactly how effective/safe/protected PHP's bcompiler is against reverse engineering. The introduction page makes a bold claim: In terms of code protection, it is safe to say that it would be impossible to recreate the exact source code that it was built from, and without the accompanying source code comments. It would effectively be useless to use the bcompiler bytecodes to recreate and modify a class. Perhaps the key word is "exact" -- how true is their claim

How can I obfuscate Java source code for external GWT development?

社会主义新天地 提交于 2019-12-06 05:52:39
Most obfuscation focuses on bytecode. I have to supply the source code too as that is what a GWT compiler an external developer would use needs to run. Before releasing the source code I need to clean it up a bit: Obfuscate method variable names Obfuscate private method argument names Remove all non-Javadoc comments except for the licence at the top of each file. Remove all Javadoc comments on private methods or protected methods of final classes. Remove certain Javadoc tags such as @author Remove certain other comment tags such as TODO, FIXME, etc. Remove all @see references to private

Proto-buf serialization with Obfuscation

杀马特。学长 韩版系。学妹 提交于 2019-12-06 05:11:02
问题 I am looking for some guidance as to what is going on when using proto-buf net with obfuscation (Dotfuscator). One half of the project is a DLL and the other is an EXE elsewhere and using proto-buf NET they exchange data flawlessly. Until I obfuscate the DLL. At that point P-BN fails without raising an exception, returning variously a 0 length byte array or a foreshortened one depending on what I have fiddled with. The class is fairly simple (VB): <ProtoContract(Name:="DMailer")> _ Friend

Android Proguard SqlCipher NoClassDefFoundError

谁说我不能喝 提交于 2019-12-06 04:29:29
问题 Have been battling with Proguard all day and have tried many examples and solutions on the official Proguard site as well as StackOverflow. I have a large project I need to obfuscate, which has a number of referenced library projects and Jars. I am getting 725 warnings from proguard from 2 libs, com.google.common and twitter4j. I can happily get the project to compile if I add the following: -dontwarn com.google.common.** -dontwarn twitter4j.** However, the app crashes instantly on open, so