Tagged articles
11 articles
Page 1 of 1
Top Architect
Top Architect
Sep 28, 2025 · Information Security

How to Harden Java Applications Against Decompilation: Techniques and Tools

This article explains why Java bytecode is vulnerable to decompilation and presents a comprehensive set of protection methods—including isolation, class encryption, native code conversion, and various obfuscation techniques—illustrated with diagrams and a real‑world case study.

Obfuscationclassloadercode protection
0 likes · 12 min read
How to Harden Java Applications Against Decompilation: Techniques and Tools
Java Tech Enthusiast
Java Tech Enthusiast
Sep 7, 2025 · Information Security

How to Protect Java Applications from Decompilation: Proven Techniques

This article explains why Java bytecode is easy to decompile and presents several practical protection methods—including isolation, class encryption, native code conversion, and various obfuscation techniques—while discussing their strengths, weaknesses, and real‑world application examples.

Obfuscationdecompilationencryption
0 likes · 12 min read
How to Protect Java Applications from Decompilation: Proven Techniques
iQIYI Technical Product Team
iQIYI Technical Product Team
Aug 30, 2024 · Mobile Development

Enhancing Hotfixes for QiYiGuo TV Using Robust and Plugin Mechanisms

To improve QiYiGuo TV’s rapid issue resolution, the team adopted Robust as the core hot‑fix engine and extended it with KRobust to handle reflection, Kotlin methods, enum‑switch mapping, and native‑library swaps, while building an automated deployment platform that now achieves over 95% fix rate and reduces average repair time from three days to under 24 hours across hundreds of channel APKs.

AndroidDeploymentHotfix
0 likes · 16 min read
Enhancing Hotfixes for QiYiGuo TV Using Robust and Plugin Mechanisms
Architecture Development Notes
Architecture Development Notes
Aug 9, 2024 · Mobile Development

Is Flutter’s Future at Risk? Uncovering Open‑Source Challenges and Alternatives

Flutter, once hailed as the future of cross‑platform development, faces growing concerns over open‑source maintenance, rapid version updates, lifecycle inconsistencies, and reliance on native code, prompting developers to consider learning native platforms, engaging the community, and exploring alternative frameworks to mitigate potential loss of Google support.

FlutterOpen-Sourcecross‑platform
0 likes · 6 min read
Is Flutter’s Future at Risk? Uncovering Open‑Source Challenges and Alternatives
Top Architect
Top Architect
Mar 13, 2022 · Information Security

Techniques for Protecting Java Bytecode from Decompilation

This article explains why Java bytecode is easy to decompile and introduces several practical techniques—including isolation, class encryption, native code conversion, and various forms of code obfuscation—to increase the difficulty of reverse‑engineering Java applications.

Obfuscationclassloadercode protection
0 likes · 13 min read
Techniques for Protecting Java Bytecode from Decompilation
Programmer DD
Programmer DD
Dec 2, 2021 · Information Security

How to Protect Java Applications from Decompilation: Techniques and Best Practices

This article explains why Java bytecode is easy to decompile and presents several practical protection methods—including isolation, class file encryption, native code conversion, and various obfuscation techniques—while discussing their advantages, limitations, and typical use cases.

class encryptioncode obfuscationdecompilation
0 likes · 13 min read
How to Protect Java Applications from Decompilation: Techniques and Best Practices
Sohu Tech Products
Sohu Tech Products
Oct 28, 2020 · Mobile Development

Android Studio 4.1 Stable Release – New Features and Improvements

Android Studio 4.1 introduces a suite of enhancements—including a Database Inspector, Material Design component updates, integrated TensorFlow Lite support, improved Apply Changes, native memory profiling, and expanded emulator capabilities—aimed at boosting productivity and code quality for Android developers.

Android StudioDaggerDatabase Inspector
0 likes · 13 min read
Android Studio 4.1 Stable Release – New Features and Improvements
Dada Group Technology
Dada Group Technology
Nov 19, 2019 · Mobile Development

Upgrading the Event Logging Framework: Native Layer Design, Implementation, and Hybrid Stack Solutions

This article explains the motivations for upgrading a mobile event‑logging framework, describes the native C‑based log system design and implementation with code examples, addresses precise exposure challenges, and presents a hybrid stack solution for RN/Flutter integration along with data degradation strategies.

event trackingnative code
0 likes · 8 min read
Upgrading the Event Logging Framework: Native Layer Design, Implementation, and Hybrid Stack Solutions
Qunar Tech Salon
Qunar Tech Salon
Aug 13, 2016 · Information Security

Android App Security Risks and Protection Strategies Presented at Qunar Tech Carnival

The article outlines common Android security vulnerabilities such as unprotected resources, easily decompiled Java and native code, and proposes protection measures like resource obfuscation, code encryption, native code hardening, and introduces the Qotector platform for APK analysis and reinforcement.

APK analysisMobile Securityapp protection
0 likes · 7 min read
Android App Security Risks and Protection Strategies Presented at Qunar Tech Carnival