Abstract
You’re now almost at the end of your journey. By now you should have a sound understanding of the overall principles of how to decompile and how to make some attempts at protecting your code. Having said that, I’ve found from working with clients and colleagues that even if you understand what decompilation and obfuscation really mean, it doesn’t help you figure out what practical measures you can take to protect your code. A little knowledge can often create more questions than answers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2012 Godfrey Nolan
About this chapter
Cite this chapter
Nolan, G. (2012). Hear No Evil, See No Evil: A Case Study. In: Decompiling Android. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-4249-9_7
Download citation
DOI: https://doi.org/10.1007/978-1-4302-4249-9_7
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-4248-2
Online ISBN: 978-1-4302-4249-9
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)