本文介绍了Android的再造:提取和保护APK资源(技术问题)的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我感兴趣的APK文件中的技术细节。我已经知道了APKTOOL能够提取等APK文件(包括smali来源)的所有布局文件,但我想khow的APKTOOL怎么做布局的提取,因为它们以某种方式加密的(如果您使用解压缩打开它)。

I'm interested in the technical details of APK files. I know already that the APKTOOL is able to extract all those layout files and so on of an APK file (including the smali sources), but I would like to khow, how the APKTOOL does the extraction of layouts, since they are crypted somehow (in case that you open it with unzip).

是否有人知道一些有关如何Android的COM presses /加密(?)这些布局中的APK文件吗?是否有任何的描述了吗?

Does anybody know something about how Android compresses/encrypts(?) those layout files in the APK files? Is there any description out there?

有谁知道一种方法来防止再造的布局? (类似的ProGuard用于源$ C ​​$ C)?

Does anybody know a way to protect layouts against reengineering? (similar to ProGuard used for the source code)?

感谢。

推荐答案

据我所知,在所有的APK XML文件都存储在二进制XML格式。因此,他们不加密,这不是一个大问题去阅读。

As far as I know, all xml files in APKs are stored in Binary XML format. So they aren't encrypted and that's not a big deal to read them.

什么保护,我不认为有办法以某种方式混淆他们。使布局难以阅读的唯一方法是直接从code创建视图,但我不认为你应该这样做。

What about protection, I don't think there's a way to obfuscate them somehow. The only way to make layouts difficult for reading is to create view directly from code, but I don't think you should do it.

这篇关于Android的再造:提取和保护APK资源(技术问题)的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持!

09-02 13:56