Tagged articles
35 articles
Page 1 of 1
Black & White Path
Black & White Path
Apr 30, 2026 · Information Security

Bypassing Webshell Detection with Branch‑Based Obfuscation and Puzzle Logic

This article explains how a PHP webshell can evade antivirus and sandbox detection by embedding a branch‑based puzzle (InazumaPuzzle) that manipulates block states, combines it with a PerlinNoise class to construct a hidden system() call, and demonstrates the step‑by‑step execution using the input sequence ABBCCD.

BypassObfuscationPHP
0 likes · 36 min read
Bypassing Webshell Detection with Branch‑Based Obfuscation and Puzzle Logic
Alibaba Cloud Observability
Alibaba Cloud Observability
Nov 10, 2025 · Mobile Development

Building a Reliable Android Crash Collection Framework: Java & Native Solutions

This article explains the challenges of Android app crashes and presents a comprehensive, cloud‑native solution that captures both Java/Kotlin and native crashes, details the underlying mechanisms such as UncaughtExceptionHandler, signal handling, minidump generation, stack unwinding, and offers practical guidance for integrating reliable crash reporting into mobile applications.

AndroidCrash ReportingJava
0 likes · 19 min read
Building a Reliable Android Crash Collection Framework: Java & Native Solutions
Alibaba Cloud Native
Alibaba Cloud Native
Nov 8, 2025 · Mobile Development

How to Capture and Analyze Android Crashes: From Java Exceptions to Native Minidumps

This technical guide explains the underlying mechanisms of Android crash collection for both Java/Kotlin and native code, outlines a four‑step capture process, compares popular solutions, and provides concrete implementation details—including signal handling, minidump generation, and stack deobfuscation—to help developers reliably record and diagnose app failures.

AndroidCrash HandlingJava
0 likes · 19 min read
How to Capture and Analyze Android Crashes: From Java Exceptions to Native Minidumps
Top Architect
Top Architect
Sep 28, 2025 · Information Security

How to Harden Java Applications Against Decompilation: Techniques and Tools

This article explains why Java bytecode is vulnerable to decompilation and presents a comprehensive set of protection methods—including isolation, class encryption, native code conversion, and various obfuscation techniques—illustrated with diagrams and a real‑world case study.

Obfuscationclassloadercode protection
0 likes · 12 min read
How to Harden Java Applications Against Decompilation: Techniques and Tools
Java Tech Enthusiast
Java Tech Enthusiast
Sep 7, 2025 · Information Security

How to Protect Java Applications from Decompilation: Proven Techniques

This article explains why Java bytecode is easy to decompile and presents several practical protection methods—including isolation, class encryption, native code conversion, and various obfuscation techniques—while discussing their strengths, weaknesses, and real‑world application examples.

ObfuscationSecuritydecompilation
0 likes · 12 min read
How to Protect Java Applications from Decompilation: Proven Techniques
Code Ape Tech Column
Code Ape Tech Column
Aug 1, 2024 · Information Security

Using ProGuard, Xjar, and ClassFinal for Java JAR Obfuscation and Encryption in Spring Boot Projects

This article explains how to protect Java backend code deployed on user servers by applying ProGuard, Xjar, and ClassFinal for JAR obfuscation and encryption, detailing Maven configurations, startup commands, decompilation results, and best‑practice integration of both tools in a Spring Boot project.

JavaObfuscationProGuard
0 likes · 24 min read
Using ProGuard, Xjar, and ClassFinal for Java JAR Obfuscation and Encryption in Spring Boot Projects
NetEase Cloud Music Tech Team
NetEase Cloud Music Tech Team
Jul 9, 2024 · Mobile Development

Making Android Baseline Profiles Work with Obfuscation, Market Limits, and Hot‑Fixes

This article explains how Baseline Profiles improve Android app start‑up performance, analyzes three major obstacles—unsupported app stores, dex‑crc mismatches caused by code‑obfuscation, and hot‑fix dex incompatibility—and provides concrete solutions including active optimization, dex‑name correction tasks, and profile injection during patch synthesis.

AndroidAoTBaseline Profiles
0 likes · 18 min read
Making Android Baseline Profiles Work with Obfuscation, Market Limits, and Hot‑Fixes
Architect
Architect
Mar 23, 2024 · Information Security

How to Secure Front‑End JavaScript: Encryption, Obfuscation, and Anti‑Debugging Techniques

This article explains why protecting client‑side JavaScript is essential, describes interface signing, outlines common compression, obfuscation and encryption methods—including variable, string, property and control‑flow tricks—introduces Emscripten/WebAssembly protection, reviews practical tools, and details debugging, anti‑debugging and counter‑measures for front‑end security.

Anti-debuggingFront-end securityJavaScript
0 likes · 18 min read
How to Secure Front‑End JavaScript: Encryption, Obfuscation, and Anti‑Debugging Techniques
Selected Java Interview Questions
Selected Java Interview Questions
Jan 30, 2024 · Backend Development

Using ProGuard, Xjar, and ClassFinal to Obfuscate and Encrypt Java JARs in Spring Boot Projects

This article explains how to protect Java server-side code from decompilation by applying ProGuard shrinking/obfuscation and Xjar/ClassFinal encryption, provides detailed Maven plugin configurations, sample pom.xml snippets, command‑line launch options, and demonstrates the resulting protected JARs with screenshots.

JavaObfuscationProGuard
0 likes · 22 min read
Using ProGuard, Xjar, and ClassFinal to Obfuscate and Encrypt Java JARs in Spring Boot Projects
Java Architect Essentials
Java Architect Essentials
Jan 30, 2024 · Backend Development

Using ProGuard for Java Code Obfuscation in Maven Projects

This article explains how to protect Java applications from decompilation by configuring a ProGuard file and adding the ProGuard Maven plugin, then building the project to generate an obfuscated JAR, complete with step‑by‑step instructions and sample configuration code.

BackendJavaObfuscation
0 likes · 5 min read
Using ProGuard for Java Code Obfuscation in Maven Projects
Open Source Linux
Open Source Linux
Jan 5, 2024 · Information Security

Secure Spring Boot Deployments with ClassFinal: Code Encryption & Machine‑Bound Launch

This guide explains how to protect Spring Boot production packages from decompilation by using the ClassFinal Maven plugin for code encryption, configuring machine‑bound startup, and comparing it with ProGuard obfuscation, including detailed plugin setup, launch commands, and observed decompilation results.

ClassFinalCode EncryptionMaven Plugin
0 likes · 7 min read
Secure Spring Boot Deployments with ClassFinal: Code Encryption & Machine‑Bound Launch
vivo Internet Technology
vivo Internet Technology
Dec 20, 2023 · Information Security

Frontend Interface Encryption, JavaScript Obfuscation, and Anti‑Debugging Techniques

The article explains how frontend interface encryption, JavaScript compression, obfuscation, and WebAssembly‑based encryption—combined with signature verification and anti‑debugging tricks such as DevTools detection and infinite debugger loops—can raise the cost of reverse‑engineering client‑side logic, though determined attackers may still eventually break the protection.

DebuggingObfuscationfrontend
0 likes · 19 min read
Frontend Interface Encryption, JavaScript Obfuscation, and Anti‑Debugging Techniques
Code Ape Tech Column
Code Ape Tech Column
Dec 11, 2023 · Information Security

Design and Implementation of a Lightweight Maven Jar Encryption and Agent‑Based Decryption Solution for Java IP Protection

This article examines common Java jar obfuscation tools, identifies their limitations for protecting both proprietary code and third‑party dependencies, and proposes a lightweight Maven‑based encryption combined with a runtime agent that decrypts classes on demand while keeping performance impact under five percent.

AgentBackend SecurityIP Protection
0 likes · 9 min read
Design and Implementation of a Lightweight Maven Jar Encryption and Agent‑Based Decryption Solution for Java IP Protection
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Sep 13, 2023 · Frontend Development

Techniques for Preventing Debugging in Front‑End JavaScript Applications

This article explains why front‑end developers may want to block debugging, demonstrates how infinite `debugger` statements can be used to hinder inspection, and provides multiple counter‑measures—including disabling breakpoints, using `Function('debugger')`, code obfuscation, and an advanced anti‑debug script that detects window size anomalies.

Anti-debuggingObfuscationSecurity
0 likes · 5 min read
Techniques for Preventing Debugging in Front‑End JavaScript Applications
Architect's Tech Stack
Architect's Tech Stack
Nov 21, 2022 · Backend Development

How to Obfuscate Java Projects Using ProGuard and Maven

This guide explains Java compilation basics, the need for code obfuscation, provides a complete ProGuard configuration file, shows how to integrate the ProGuard Maven plugin into a pom.xml, and demonstrates building an obfuscated JAR with Maven.

JavaObfuscationProGuard
0 likes · 7 min read
How to Obfuscate Java Projects Using ProGuard and Maven
Sohu Tech Products
Sohu Tech Products
Nov 17, 2022 · Information Security

How to Obfuscate Java Projects Using ProGuard and Maven

This article explains the concepts of Java compilation and decompilation, introduces code obfuscation with ProGuard, and provides step‑by‑step Maven configuration to protect Java applications from reverse engineering, including sample configuration files and build commands.

ObfuscationProGuardbuild tools
0 likes · 7 min read
How to Obfuscate Java Projects Using ProGuard and Maven
Laravel Tech Community
Laravel Tech Community
Oct 9, 2022 · Information Security

PHP One‑Liner Webshells and Evasion Techniques

This article explains various one‑line PHP webshell payloads, compares eval and assert functions, and demonstrates multiple obfuscation methods such as XOR, base64, rot13, concatenation, custom function wrappers, variable variables, class‑based tricks, and version‑specific payloads to bypass WAFs and antivirus detection.

EvasionObfuscationPHP
0 likes · 12 min read
PHP One‑Liner Webshells and Evasion Techniques
MaGe Linux Operations
MaGe Linux Operations
Oct 1, 2022 · Information Security

Mastering PHP One‑Line Webshell Evasion: Techniques & Payloads

This article explores various PHP one‑line webshell payloads, compares eval and assert functions, and presents multiple evasion techniques such as XOR, base64, rot13, string concatenation, variable obfuscation, and version‑specific tricks to bypass WAFs and antivirus detection.

EvasionObfuscationOne-liner
0 likes · 16 min read
Mastering PHP One‑Line Webshell Evasion: Techniques & Payloads
IT Services Circle
IT Services Circle
Jul 21, 2022 · Frontend Development

Understanding JSFuck: Writing Executable JavaScript with Only []()!+ Characters

This article explains how JavaScript’s type coercion rules allow the construction of any code using only six characters—[]()!+—by demonstrating conversions for booleans, numbers, letters, special symbols, and finally assembling arbitrary executable code via the Function constructor, with examples and a link to the online converter.

Code GenerationJSFuckJavaScript
0 likes · 6 min read
Understanding JSFuck: Writing Executable JavaScript with Only []()!+ Characters
JD Retail Technology
JD Retail Technology
Jun 1, 2022 · Mobile Development

Migrating JD Android App to R8: Obfuscation Rules, v1 Signing Issues, and Build Process Pitfalls

This article details JD's Android app migration to the R8 compiler, explains differences between ProGuard and R8, analyzes the impact of the -useuniqueclassmembernames rule, addresses v1 signing loss after AGP 3.6.4 upgrade, and provides practical solutions for build‑process ordering and packaging pitfalls.

AGPAndroidBuild Optimization
0 likes · 23 min read
Migrating JD Android App to R8: Obfuscation Rules, v1 Signing Issues, and Build Process Pitfalls
Top Architect
Top Architect
Mar 13, 2022 · Information Security

Techniques for Protecting Java Bytecode from Decompilation

This article explains why Java bytecode is easy to decompile and introduces several practical techniques—including isolation, class encryption, native code conversion, and various forms of code obfuscation—to increase the difficulty of reverse‑engineering Java applications.

JavaObfuscationSecurity
0 likes · 13 min read
Techniques for Protecting Java Bytecode from Decompilation
Top Architect
Top Architect
Jan 5, 2022 · Information Security

Common Techniques for Protecting Java Programs from Decompilation

The article outlines several common techniques for protecting Java programs from decompilation, including isolation, class file encryption, native code conversion, and various forms of code obfuscation such as symbol, data, control, and preventive obfuscation, and presents a case study of a protected SCJP exam application.

JavaObfuscationclassloader
0 likes · 13 min read
Common Techniques for Protecting Java Programs from Decompilation
Meituan Technology Team
Meituan Technology Team
Nov 25, 2021 · Information Security

Analysis of Apple FairPlay DRM: Architecture, Obfuscation Techniques, and Weaknesses

The article dissects Apple’s FairPlay DRM, detailing its kernel‑driver and daemon decryption workflow, the LC_ENCRYPTION_INFO metadata, per‑user licensing files, LLVM‑level obfuscation techniques such as opaque predicates and control‑flow flattening, and the identified weaknesses that enable reverse‑engineering and key extraction.

DRMFairPlayObfuscation
0 likes · 18 min read
Analysis of Apple FairPlay DRM: Architecture, Obfuscation Techniques, and Weaknesses
ByteFE
ByteFE
May 31, 2021 · Information Security

How to Harden Electron Apps with V8 Bytecode and Native Addons

This article explains how to protect Electron desktop applications from unpacking, tampering, and repackaging by comparing common obfuscation methods, introducing V8 bytecode compilation, embedding it in a Rust‑based Node Addon using N‑API, and detailing the build process, performance impact, and limitations.

ElectronN-APINode Addon
0 likes · 20 min read
How to Harden Electron Apps with V8 Bytecode and Native Addons
Sohu Tech Products
Sohu Tech Products
Jun 17, 2020 · Information Security

Analyzing and Removing Dead Code and Flower‑Instruction Obfuscation from JavaScript

This tutorial explains how to recognize and eliminate dead code and flower‑instruction obfuscation techniques in JavaScript, walks through using Obfuscator.io to generate heavily mixed code, and demonstrates step‑by‑step static analysis to strip away useless statements, ultimately restoring the original concise logic.

Dead CodeObfuscationinformation security
0 likes · 12 min read
Analyzing and Removing Dead Code and Flower‑Instruction Obfuscation from JavaScript
Liangxu Linux
Liangxu Linux
Dec 26, 2019 · Fundamentals

How to Write Code Nobody Can Maintain: A Satirical Guide to Anti‑Patterns

This tongue‑in‑cheek article enumerates a series of deliberately harmful programming anti‑patterns—from confusing variable names and deceptive documentation to absurd design choices and nonexistent testing—showing how to make code virtually impossible to understand or maintain.

ObfuscationSoftware Engineeringbad practices
0 likes · 14 min read
How to Write Code Nobody Can Maintain: A Satirical Guide to Anti‑Patterns
Qunar Tech Salon
Qunar Tech Salon
Aug 3, 2017 · Information Security

Why Use LLVM for Obfuscation and How to Apply It in Android Development

This article explains the reasons for using LLVM to obfuscate Android applications, describes various LLVM-based obfuscation techniques such as instruction substitution, control‑flow flattening, bogus control flow, and custom passes, and illustrates their effects with diagrams.

AndroidLLVMMobile Development
0 likes · 2 min read
Why Use LLVM for Obfuscation and How to Apply It in Android Development