Source code encryption includes: Dex file protection, anti-secondary packaging, so file protection and resource file protection. Take Dex file protection as an example. Dex file protection includes: advanced obfuscation, DEX file shell, DEX file flower, dynamic class loading and memory dump prevention.
Advanced obfuscation: code obfuscation will reduce code readability and package size.
Shell dex file: equivalent to packaging the source code into other folders. The reverse tool parses the encrypted DEX file and can only see the shell file, which can prevent the real source code from being seen after unpacking. Love encryption uses hollow-out technology to realize function-level encryption, which has high security strength and fast startup efficiency.
Dex plus flowers: Because most reverse tools read bytecodes linearly and parse them, when encountering invalid bytecodes, the decompiler's bytecode parsing will fail. Love encryption inserts invalid bytecode in dex file, and ensures that bytecode will never be executed, otherwise the program will crash. This can play the role of decompilation.
Dex dynamic class loading: the source code of encrypted dex files can be dynamically separated, and the source code can be loaded into memory in sections at runtime.
Memory dump prevention: the code will be released when the program is running, and memory dump prevention can prevent the program from being hijacked when it is running.
Application security includes: log log input masking and application clearing. The cleaning technology depends on the blacklist and whitelist DB in the cloud, and the local blacklist and whitelist DB data will be automatically updated every time the application is started. If an abnormal situation is detected, the user can be prompted.
Data security includes: page hijacking prevention, local data protection, screen capture protection, memory data query prevention, protocol encryption and virtual keyboard.