android怎么把工程变成混淆,Android如何在完成逆向工程后阅读混淆的Java代码

DeGuard是ETH Zurich软件可靠性实验室开发的一个统计去混淆工具,类似于JSNice。它使用从数千个开源程序中学习到的概率图模型,能够恢复Android APK的重要信息,包括方法名、类名和第三方库。DeGuard还能揭示Android恶意软件中的字符串解码器和处理敏感数据的类。
摘要由CSDN通过智能技术生成

DeGuard

DeGuard (07001) is a novel system for statistical

deobfuscation of Android APKs, developed at the Software Reliability

Lab, ETH Zurich, the same group which developed the widely used JSNice

system. Similarly to JSNice, DeGuard is based on powerful

probabilistic graphical models learned from thousands of open source

programs. Using these models, DeGuard recovers important information

in Android APKs, including method and class names as well as

third-party libraries. DeGuard can reveal string decoders and classes

that handle sensitive data in Android malware.

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值