Tagged articles
11 articles
Page 1 of 1
Top Architect
Top Architect
Sep 28, 2025 · Information Security

How to Harden Java Applications Against Decompilation: Techniques and Tools

This article explains why Java bytecode is vulnerable to decompilation and presents a comprehensive set of protection methods—including isolation, class encryption, native code conversion, and various obfuscation techniques—illustrated with diagrams and a real‑world case study.

Obfuscationclassloadercode protection
0 likes · 12 min read
How to Harden Java Applications Against Decompilation: Techniques and Tools
Top Architect
Top Architect
Mar 25, 2024 · Backend Development

Design and Evaluation of Java Backend Code Protection Solutions

This article analyses the challenges of protecting intellectual property in B2B Java applications, reviews existing obfuscation and encryption tools, and proposes a lightweight Maven‑based encryption plus javaagent decryption scheme that secures both proprietary code and third‑party dependencies while keeping performance impact below five percent.

BackendJavaProGuard
0 likes · 9 min read
Design and Evaluation of Java Backend Code Protection Solutions
Baidu Tech Salon
Baidu Tech Salon
Jul 4, 2023 · Information Security

Implementation and Practice of DEX‑VMP Code Protection for Android Applications

The article details how Android developers can protect APK dex files by progressively hardening code—using dynamic loading, hooking, instruction extraction, java‑to‑C++ conversion, and ultimately DEX‑VMP virtual machine encryption—while outlining implementation steps, custom opcodes, JNI integration, and addressing compatibility and performance trade‑offs.

AndroidDEXSecurity
0 likes · 17 min read
Implementation and Practice of DEX‑VMP Code Protection for Android Applications
Baidu Geek Talk
Baidu Geek Talk
Jun 28, 2023 · Information Security

DEX‑VMP Based Android Code Protection: Design, Implementation, and Analysis

The paper presents a DEX‑VMP scheme that encrypts Dalvik bytecode and executes it via a custom virtual machine and JNI bridge, merging the strengths of dynamic loading, hooking, instruction extraction, and java‑to‑C++ conversion while highlighting compatibility issues, performance overhead, and the need for selective protection of high‑value Android methods.

AndroidDEXJNI
0 likes · 17 min read
DEX‑VMP Based Android Code Protection: Design, Implementation, and Analysis
Sohu Tech Products
Sohu Tech Products
Nov 17, 2022 · Information Security

How to Obfuscate Java Projects Using ProGuard and Maven

This article explains the concepts of Java compilation and decompilation, introduces code obfuscation with ProGuard, and provides step‑by‑step Maven configuration to protect Java applications from reverse engineering, including sample configuration files and build commands.

ObfuscationProGuardbuild tools
0 likes · 7 min read
How to Obfuscate Java Projects Using ProGuard and Maven
Top Architect
Top Architect
Mar 13, 2022 · Information Security

Techniques for Protecting Java Bytecode from Decompilation

This article explains why Java bytecode is easy to decompile and introduces several practical techniques—including isolation, class encryption, native code conversion, and various forms of code obfuscation—to increase the difficulty of reverse‑engineering Java applications.

JavaObfuscationSecurity
0 likes · 13 min read
Techniques for Protecting Java Bytecode from Decompilation
Top Architect
Top Architect
Jan 5, 2022 · Information Security

Common Techniques for Protecting Java Programs from Decompilation

The article outlines several common techniques for protecting Java programs from decompilation, including isolation, class file encryption, native code conversion, and various forms of code obfuscation such as symbol, data, control, and preventive obfuscation, and presents a case study of a protected SCJP exam application.

JavaObfuscationclassloader
0 likes · 13 min read
Common Techniques for Protecting Java Programs from Decompilation
Python Programming Learning Circle
Python Programming Learning Circle
Oct 8, 2021 · Information Security

Using PyArmor to Protect Python Code: Features, Quick Start, Project Management, and Command Reference

This guide explains how PyArmor encrypts and protects Python scripts through seamless replacement, dynamic encryption, licensing, hardware binding, and packaging, providing step‑by‑step installation, usage commands, project management techniques, and a comprehensive command reference for developers.

LicensingSecuritycode protection
0 likes · 7 min read
Using PyArmor to Protect Python Code: Features, Quick Start, Project Management, and Command Reference
ByteFE
ByteFE
May 31, 2021 · Information Security

How to Harden Electron Apps with V8 Bytecode and Native Addons

This article explains how to protect Electron desktop applications from unpacking, tampering, and repackaging by comparing common obfuscation methods, introducing V8 bytecode compilation, embedding it in a Rust‑based Node Addon using N‑API, and detailing the build process, performance impact, and limitations.

ElectronN-APINode Addon
0 likes · 20 min read
How to Harden Electron Apps with V8 Bytecode and Native Addons