This chapter looks at some of the tools as well as some simple techniques that hackers use to reverse-engineer the underlying source code from an Android package file (APK). It also takes a brief look at the major open source and commercial obfuscators, because obfuscation is far and away the most popular tool for protecting source code. In addition, the chapter covers the theory behind these obfuscators so you’re better informed about what you’re buying.
KeywordsBurning Marketing Dium Cond Suffix
Unable to display preview. Download preview PDF.