This is the top result when Googling for "android application cracking":

http://androidcracking.blogspot.com/

for educational purposes only, of course.

It should give you an idea of what kinds of attacks your application might
be subjected to.

There might be even be a script or two to test your own protection scheme.

-- K

12 апреля 2012 г. 23:17 пользователь Latimerius
<[email protected]>написал:

> 2012/4/12 Kostya Vasilyev <[email protected]>:
> > Class.forName is just as easy to identify
> > as getPackageManager.getPackageInfo...
> >
> > IIRC, the script I was referring to earlier could handle reflection...
>
> So I assume reflection could only be of significant help if you a) use
> it a lot, not just to hide your security-related calls, and b)
> obfuscate your strings properly.  Point a) would be hard to achieve in
> my case.
>
> --
> You received this message because you are subscribed to the Google
> Groups "Android Developers" group.
> To post to this group, send email to [email protected]
> To unsubscribe from this group, send email to
> [email protected]
> For more options, visit this group at
> http://groups.google.com/group/android-developers?hl=en
>

-- 
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to
[email protected]
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Reply via email to