Protecting my apps security from deassembling

Posted by sandis on Stack Overflow See other posts from Stack Overflow or by sandis
Published on 2010-05-21T12:21:59Z Indexed on 2010/05/21 12:50 UTC
Read the original article Hit count: 207

So I recently tested deassembling one of my android apps, and to my horror I discovered that the code was quite readable. Even worse, all my variable names where intact! I thought that those would be compressed to something unreadable at compile time. The app is triggered to expire after a certain time. However, now it was trivial for me to find my function named checkIfExpired() and find the variable "expired". Is there any good way of making it harder for a potential hacker messing with my app?

Before someone states the obvious: Yes, it is security through obscurity. But obviously this is my only option since the user always will have access to all my code. This is the same for all apps. The details of my deactivation-thingy is unimportant, the point is that I dont want deassembler to understand some of the things I do.

side questions: Why are the variable names not compressed? Could it be the case that my program would run faster if I stopped using really long variable names, as are my habit?

© Stack Overflow or respective owner

Related posts about android

Related posts about security