2011년 2월 28일 월요일
[Android Course][English][Theme] - Android Eclipse "Proguard" use
※ Proguard ?
: "Code obfuscation" Tool by, the various symbols used in the code generated by the machine's name is short, replace the name change.
Therefore, the attacker dontAllow () method is used instead of the information that a () uses a method that will give information only. Thus, the attacker does not see the original source code of each method to perform a task that is difficult to notice on a hunch
: It was personal it was a commercial Android dex tool because it uses Java code and the jad tool and you can decompile and reverse engineering is over. To solve this problem by using the code tools I Tues dock to make it difficult to reverse will be used. proguard nandokyi depending on how the coding, but there is nothing that can be decrypted is not possible.
1. Install the latest version of ADT
: "Window -> Android SDK and AVD Manager" and install the latest version through.
: First of course you are currently using the latest version of ADT (after version 8.0.1) must be installed. If you have already installed the latest version of ADT are you an update. ADT is equivalent to update the application to determine the target platform, no matter what we do not have big worries about compatibility updates You may boldly without.
2. Create a new project
- "Eclipse" from the "File> New> Android Project" on creating a new project by choosing (2 files in the root folder of the project generated) : "Proguard.cfg" Think of it as a professional guard configuration files, and basically set the appropriate values for the Android (referenced by name in the manifest does not obfuscation, such as a class may have ,...), the private developers who, without any modification if the If you must use a configuration file seems to be : "Default.properties" (Project settings file) opens a file using the following procedure would set a guard will just add value.
: The build process automatically "Proguard Tool" two works. Proguard to your project folder is a newly created sub-folders within that folder, the following four files are generated.
- Dump.txt: Your application is being used in the internal structure of the class represents information about the rough. Literally for obfuscation in the process of analyzing the source deompeugapdeulyigetjo out. Well. - Mapping.txt: This file is important. Existing class or method is in the process of obfuscation which has been mapped to the new obfuscated name to the list, marked. Occurs in a log or application obfuscation, better prepared to analyze the stack trace is extremely important. - Seeds.txt: Obfuscation is a list of classes and members are not. - Usage.txt: because they are not used, apk files are removed from the list of codes. Doeseoneun removal method or class you should not have been removed, you will want to check out.
In addition, inquiries, or questions, please contact us.