Tag

code protection

0 views collected around this technical thread.

Top Architect
Top Architect
Mar 25, 2024 · Backend Development

Design and Evaluation of Java Backend Code Protection Solutions

This article analyses the challenges of protecting intellectual property in B2B Java applications, reviews existing obfuscation and encryption tools, and proposes a lightweight Maven‑based encryption plus javaagent decryption scheme that secures both proprietary code and third‑party dependencies while keeping performance impact below five percent.

GraalVMJavaMaven
0 likes · 9 min read
Design and Evaluation of Java Backend Code Protection Solutions
Baidu Tech Salon
Baidu Tech Salon
Jul 4, 2023 · Information Security

Implementation and Practice of DEX‑VMP Code Protection for Android Applications

The article details how Android developers can protect APK dex files by progressively hardening code—using dynamic loading, hooking, instruction extraction, java‑to‑C++ conversion, and ultimately DEX‑VMP virtual machine encryption—while outlining implementation steps, custom opcodes, JNI integration, and addressing compatibility and performance trade‑offs.

DexVMPVirtual Machine
0 likes · 17 min read
Implementation and Practice of DEX‑VMP Code Protection for Android Applications
Baidu Geek Talk
Baidu Geek Talk
Jun 28, 2023 · Information Security

DEX‑VMP Based Android Code Protection: Design, Implementation, and Analysis

The paper presents a DEX‑VMP scheme that encrypts Dalvik bytecode and executes it via a custom virtual machine and JNI bridge, merging the strengths of dynamic loading, hooking, instruction extraction, and java‑to‑C++ conversion while highlighting compatibility issues, performance overhead, and the need for selective protection of high‑value Android methods.

DexJNIVMP
0 likes · 17 min read
DEX‑VMP Based Android Code Protection: Design, Implementation, and Analysis
Sohu Tech Products
Sohu Tech Products
Nov 17, 2022 · Information Security

How to Obfuscate Java Projects Using ProGuard and Maven

This article explains the concepts of Java compilation and decompilation, introduces code obfuscation with ProGuard, and provides step‑by‑step Maven configuration to protect Java applications from reverse engineering, including sample configuration files and build commands.

Build ToolsJavaMaven
0 likes · 7 min read
How to Obfuscate Java Projects Using ProGuard and Maven
Top Architect
Top Architect
Mar 13, 2022 · Information Security

Techniques for Protecting Java Bytecode from Decompilation

This article explains why Java bytecode is easy to decompile and introduces several practical techniques—including isolation, class encryption, native code conversion, and various forms of code obfuscation—to increase the difficulty of reverse‑engineering Java applications.

ClassLoaderJavaNative Code
0 likes · 13 min read
Techniques for Protecting Java Bytecode from Decompilation
Top Architect
Top Architect
Jan 5, 2022 · Information Security

Common Techniques for Protecting Java Programs from Decompilation

The article outlines several common techniques for protecting Java programs from decompilation, including isolation, class file encryption, native code conversion, and various forms of code obfuscation such as symbol, data, control, and preventive obfuscation, and presents a case study of a protected SCJP exam application.

ClassLoaderJavacode protection
0 likes · 13 min read
Common Techniques for Protecting Java Programs from Decompilation
Python Programming Learning Circle
Python Programming Learning Circle
Oct 8, 2021 · Information Security

Using PyArmor to Protect Python Code: Features, Quick Start, Project Management, and Command Reference

This guide explains how PyArmor encrypts and protects Python scripts through seamless replacement, dynamic encryption, licensing, hardware binding, and packaging, providing step‑by‑step installation, usage commands, project management techniques, and a comprehensive command reference for developers.

Pythoncode protectionencryption
0 likes · 7 min read
Using PyArmor to Protect Python Code: Features, Quick Start, Project Management, and Command Reference
Python Programming Learning Circle
Python Programming Learning Circle
Mar 26, 2020 · Information Security

Techniques for Protecting Python Source Code: .pyc Distribution, Obfuscation, py2exe, and Cython

This article explains various methods to protect Python source code—including distributing compiled .pyc files, applying code obfuscation, packaging with py2exe, and compiling with Cython—detailing their concepts, implementation steps, advantages, and limitations.

CompilationCythoncode protection
0 likes · 10 min read
Techniques for Protecting Python Source Code: .pyc Distribution, Obfuscation, py2exe, and Cython