How to avoid reverse engineering of an APK file?

后端 未结 30 2236
醉梦人生
醉梦人生 2020-11-21 22:27

I am developing a payment processing app for Android, and I want to prevent a hacker from accessing any resources, assets or source code from the APK file.<

相关标签:
30条回答
  • 2020-11-21 23:03

    Nothing is secure when you put it on end-users hand but some common practice may make this harder for attacker to steal data.

    • Put your main logic (algorithms) into server side.
    • Communicate with server and client; make sure communication b/w server and client is secured via SSL or HTTPS; or use other techniques key-pair generation algorithms (ECC, RSA). Ensure that sensitive information is remain End-to-End encrypted.
    • Use sessions and expire them after specific time interval.
    • Encrypt resources and fetch them from server on demand.
    • Or you can make Hybrid app which access system via webview protect resource + code on server

    Multiple approaches; this is obvious you have to sacrifice among performance and security

    0 讨论(0)
  • 2020-11-21 23:04

    At no point in the history of computing has it ever been possible to prevent reverse-engineering of software when you give a working copy of it to your attacker. Also, in most likelihood, it never will be possible.

    With that understood, there is an obvious solution: don't give your secrets to your attacker. While you can't protect the contents of your APK, what you can protect is anything you don't distribute. Typically this is server-side software used for things like activation, payments, rule-enforcement, and other juicy bits of code. You can protect valuable assets by not distributing them in your APK. Instead, set up a server that responds to requests from your app, "uses" the assets (whatever that might mean) and then sends the result back to the app. If this model doesn't work for the assets you have in mind, then you may want to re-think your strategy.

    Also, if your primary goal is to prevent app piracy: don't even bother. You've already burned more time and money on this problem than any anti-piracy measure could possibly ever hope to save you. The return on investment for solving this problem is so low that it doesn't make sense to even think about it.

    0 讨论(0)
  • 2020-11-21 23:04

     1. How can I completely avoid reverse engineering of an Android APK? Is this possible?

    That is impossible

     2. How can I protect all the app's resources, assets and source code so that hackers can't hack the APK file in any way?

    Developers can take steps such as using tools like ProGuard to obfuscate their code, but up until now, it has been quite difficult to completely prevent someone from decompiling an app.

    It's a really great tool and can increase the difficulty of 'reversing' your code whilst shrinking your code's footprint.

    Integrated ProGuard support: ProGuard is now packaged with the SDK Tools. Developers can now obfuscate their code as an integrated part of a release build.

     3. Is there a way to make hacking more tough or even impossible? What more can I do to protect the source code in my APK file?

    While researching, I came to know about HoseDex2Jar. This tool will protect your code from decompiling, but it seems not to be possible to protect your code completely.

    Some of helpful links, you can refer to them.

    • Proguard, Android, and the Licensing Server
    • Securing Android LVL Applications
    • Stack Overflow question Is it really impossible to protect Android apps from reverse engineering?
    • Stack Overflow question How to prevent reverse engineering of an Android APK file to secure code?
    0 讨论(0)
  • 2020-11-21 23:04

    Agreed with @Muhammad Saqib here: https://stackoverflow.com/a/46183706/2496464

    And @Mumair give a good starting steps: https://stackoverflow.com/a/35411378/474330

    It is always safe to assume that everything you distribute to your user's device, belong to the user. Plain and simple. You may be able to use the latest tools and procedure to encrypt your intellectual properties but there is no way to prevent a determined person from 'studying' your system. And even if the current technology may make it difficult for them to gain unwanted access, there might be some easy way tomorrow, or even just the next hour!

    Thus, here comes the equation:

    When it comes to money, we always assume that client is untrusted.
    

    Even in as simple as an in-game economy. (Especially in games! There are more 'sophisticated' users there and loopholes spread in seconds!)

    How do we stay safe?

    Most, if not all, of our key processing systems (and database of course) located on the server side. And between the client and server, lies encrypted communications, validations, etc. That is the idea of thin client.

    0 讨论(0)
  • 2020-11-21 23:04

    How can I protect all the app's resources, assets and source code so that hackers can't hack the APK file in any way?

    An APK file is protected with the SHA-1 algorithm. You can see some files in the META-INF folder of APK. If you extract any APK file and change any of its content and zip it again and when you run that new APK file on an Android machine, it will not work, because the SHA-1 hashes will never match.

    0 讨论(0)
  • 2020-11-21 23:06

     1. How can I completely avoid reverse engineering of an Android APK? Is this possible?

    This isn't possible

     2. How can I protect all the app's resources, assets and source code so that hackers can't hack the APK file in any way?

    When somebody change a .apk extension to .zip, then after unzipping, someone can easily get all resources (except Manifest.xml), but with APKtool one can get the real content of the manifest file too. Again, a no.

     3. Is there a way to make hacking more tough or even impossible? What more can I do to protect the source code in my APK file?

    Again, no, but you can prevent upto some level, that is,

    • Download a resource from the Web and do some encryption process
    • Use a pre-compiled native library (C, C++, JNI, NDK)
    • Always perform some hashing (MD5/SHA keys or any other logic)

    Even with Smali, people can play with your code. All in all, it's not POSSIBLE.

    0 讨论(0)
提交回复
热议问题