This is the top result when Googling for "android application cracking":
http://androidcracking.blogspot.com/ for educational purposes only, of course. It should give you an idea of what kinds of attacks your application might be subjected to. There might be even be a script or two to test your own protection scheme. -- K 12 апреля 2012 г. 23:17 пользователь Latimerius <[email protected]>написал: > 2012/4/12 Kostya Vasilyev <[email protected]>: > > Class.forName is just as easy to identify > > as getPackageManager.getPackageInfo... > > > > IIRC, the script I was referring to earlier could handle reflection... > > So I assume reflection could only be of significant help if you a) use > it a lot, not just to hide your security-related calls, and b) > obfuscate your strings properly. Point a) would be hard to achieve in > my case. > > -- > You received this message because you are subscribed to the Google > Groups "Android Developers" group. > To post to this group, send email to [email protected] > To unsubscribe from this group, send email to > [email protected] > For more options, visit this group at > http://groups.google.com/group/android-developers?hl=en > -- You received this message because you are subscribed to the Google Groups "Android Developers" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/android-developers?hl=en

