{"id":2352,"date":"2019-03-26T12:29:55","date_gmt":"2019-03-26T12:29:55","guid":{"rendered":"https:\/\/www.varutra.com\/blog\/?p=1963"},"modified":"2022-12-02T15:22:58","modified_gmt":"2022-12-02T09:52:58","slug":"code-obfuscation","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/code-obfuscation\/","title":{"rendered":"Code Obfuscation"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2019\/03\/Code-Obfuscation-1-1024x535.png\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"Code Obfuscation - Varutra Consulting\"><\/p>\n<h3><strong>Abstract<\/strong><\/h3>\n<p style=\"text-align: left\">In this paper, we came up with a basic understanding of Code Obfuscation &#8211; A Code Protection Technology which need anti-reverse engineering transformations to change programs in such a way that tools and approaches for program analysis become ineffective.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>What is Code Obfuscation?<\/strong><\/h3>\n<p style=\"text-align: left\">The word Obfuscation accurately means &#8216;making something less obvious and harder to get it.<\/p>\n<p style=\"text-align: left\">Code obfuscation is a group of program alteration that makes program code and\/or its execution challenging to analyze by deterring both manual and automated inspection. Obfuscating source code makes it very difficult for hackers to understand. It is also used to prevent the reverse-engineering of software.<\/p>\n<p style=\"text-align: left\">Obfuscation is NOT similar as encryption. Encryption is used where we transform data in order to keep it secret from others. Whereas, the purpose of obfuscation is to make it difficult for humans to understand the data. Encrypted code always needs to be decrypted before execution, while de-obfuscation does not require for an obfuscation code during its execution.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Why use a Code Obfuscator?<\/strong><\/h3>\n<ol>\n<li style=\"text-align: left\">Once you develop an application (Any Application), your aim is to make it tougher for attackers to review the code and analyze the application.<\/li>\n<li style=\"text-align: left\">It is very important to hide business logic and code to form it tougher for attackers to achieve access and begin debugging and tampering together with your application. (They usually repackage an application with malicious code.)<\/li>\n<li style=\"text-align: left\">Code obfuscation will drastically decrease file size, and download time can also be reduced considerably. (Consider JavaScript as an example.)<\/li>\n<li style=\"text-align: left\">Folks are creating careers out of reverse engineering\u2014Therefore, you wish to form it as tough as possible to discourage them.<\/li>\n<li style=\"text-align: left\">Industries, which are developing applications, might not wish that users could easily get their source code.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h3><strong>How does Code Obfuscation Work?<\/strong><\/h3>\n<p style=\"text-align: left\">Code obfuscation comes up with completely different techniques, each building on top of the other, thus rendering the code is unintelligible.<\/p>\n<p style=\"text-align: left\">Some typical samples of obfuscation and application security techniques include:<\/p>\n<p style=\"text-align: left\"><em>Rename Obfuscation:\u00a0<\/em>By altering the name of methods and variables makes the decompiled source tougher for people to understand but it doesn\u2019t alter program execution. The new names will utilize totally different schemes like \u201ca\u201d, \u201cb\u201d, \u201cc\u201d, or numbers, unprintable characters or invisible characters and names will be full as long they need a totally different scope. Name obfuscation may be a basic rework that&#8217;s utilized by most .NET, iOS, Java and mechanical man obfuscators.<\/p>\n<p style=\"text-align: left\"><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/03\/1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1967 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/03\/1.jpg\" alt=\"Rename obfuscation\" width=\"1200\" height=\"262\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Fig: 1(Rename obfuscation)<\/em><\/p>\n<p style=\"text-align: left\"><em>String Encryption: <\/em>All strings are clearly determinable and decipherable in managed executable form. Even once methods and variables are renamed, strings can be used to locate a critical code section in the reference of a binary string. This includes messages (especially error messages) that are shown to the user. To run an efficient barrier against this sort of attack, string cryptography hides strings within the executable format and just restores their original value once required. Decrypting strings at runtime sometimes incurs a small runtime performance penalty.<\/p>\n<p style=\"text-align: left\"><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/03\/2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1968 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/03\/2.jpg\" alt=\"String obfuscation\" width=\"1393\" height=\"129\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Fig: 2(String obfuscation)<\/em><\/p>\n<p style=\"text-align: left\"><em>Control Flow Obfuscation<\/em><em>:<\/em> Control flow obfuscation creates conditional, branching, and repetitive theories that turn out valid possible logic. However, it yields dissimilar results once decompiled. It makes decompiled code incredibly tough for a hacker to understand. These techniques might have an effect on the runtime performance of a format.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/03\/3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1966 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/03\/3.jpg\" alt=\"Control Obfuscation\" width=\"1355\" height=\"332\" \/><\/a><em>Fig: 3(Control Obfuscation)<\/em><\/p>\n<p style=\"text-align: left\"><em>Instruction Pattern Transformation<\/em>: It converts common guidelines created by the compiler to alternate and less obvious concepts. These are impeccably legal machine language commands that will not map cleanly to high-level languages like Java or C#. One example is temporary variable caching that controls the stack-based nature of the Java and .NET runtimes.<\/p>\n<p style=\"text-align: left\"><em>Dummy Code Insertion: <\/em>Inserting code into the practice that doesn&#8217;t have an effect on the logic of the program. However, it decompiles or makes reverse designed code which is tougher for further research.<\/p>\n<p style=\"text-align: left\">Example Dummy variables:<\/p>\n<p style=\"text-align: left\">Student Favourite Game: Ludo, PUBG &amp; Indoor game.<\/p>\n<p style=\"text-align: left\"><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/03\/4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1969 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/03\/4.png\" alt=\"dummy code insertion\" width=\"472\" height=\"106\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2019\/03\/4.png 472w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2019\/03\/4-300x67.png 300w\" sizes=\"(max-width: 472px) 100vw, 472px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Fig: 4(dummy code insertion)<\/em><\/p>\n<p style=\"text-align: left\"><em>Dead Code and Metadata Removal: <\/em>By eliminating debug information, non- essential metadata and unused code from applications generate less important and smaller assembly size on disk, which improves the load time during execution.<\/p>\n<p style=\"text-align: left\"><em>Binary Linking\/Merging: <\/em>These changes combine multiple input executables\/libraries into one or additional output binaries. Linking can build your application smaller, mostly once used with renaming and pruning. It can make simple scenarios and may reduce information accessible to hackers.<\/p>\n<p style=\"text-align: left\"><em>Opaque Predicate Insertion: <\/em>Obfuscates by adding conditional branches that continuously judge to acknowledge results that can&#8217;t simply be determined via static analysis. This can be some way of introducing doubtless incorrect code which will never really be dead. However, it confuses attackers to attempt or understand the decompiled output.<\/p>\n<p style=\"text-align: left\"><em>Anti-Tamper: <\/em>An obfuscator will inject application protection into your code to verify your application has not been tampered by any approach. If meddling is detected, it will halt the request, limit the functionality, invoke random crashes or perform the other custom action. It would additionally send a message to a service to supply details regarding the meddling detected.<\/p>\n<p style=\"text-align: left\"><em>Anti-Debug: <\/em>When a hacker is making an attempt to pirate or counterfeit your app, steal your information or alter the behavior of an essential piece of infrastructure set, they will nearly begin with reverse engineering and stepping through your application with a debugger. An obfuscator will layer in application protection by injecting code to find if your production application is executed among a computer program. If a computer program is employed, it will corrupt sensitive information (protecting it from theft), invoke random crashes (to disguise that the crash was the results of a right check) or perform the other custom actions. It also sends a message to a service to deliver a signal.<\/p>\n<p>&nbsp;<\/p>\n<h3 style=\"text-align: left\"><strong>Drawbacks of using an obfuscator<\/strong><\/h3>\n<ol style=\"text-align: left\">\n<li>In some cases, antivirus computer code like AVG Antiviruses can provide you with a warning once you visit a web site that has been obfuscated (as one in all the needs of obfuscation is to cover malicious code). However, with the case, wherever obfuscation has been doled out of security reasons. It\u2019s going to deter users from victimization or visiting a website.<\/li>\n<li>Several techniques might negatively have an effect on the performance of algorithms.<\/li>\n<\/ol>\n<p style=\"text-align: left\">You will be able to use the following tools for a particular language:<\/p>\n<p style=\"text-align: left\"><strong>.Net:<\/strong> Dotfuscator, ILprotector<\/p>\n<p style=\"text-align: left\"><strong>JavaScript:<\/strong> JavaScript obfuscator, Jscrambler<\/p>\n<p style=\"text-align: left\"><strong>Android:<\/strong> ProGuard<\/p>\n<p>&nbsp;<\/p>\n<h3 style=\"text-align: left\"><strong>\u00a0<\/strong><strong>Conclusion<\/strong><\/h3>\n<p style=\"text-align: left\">Although obfuscation will build reading and reverse-engineering a program hard-hitting and long, it\u2019s necessary to retain in mind. Code obfuscation will be a decent job of obscuring source code. There is no obfuscator that guarantees more security. Therefore, in cases where security is very important, you\u2019ll have to use other trials, including various encryption schemes.<\/p>\n<p>&nbsp;<\/p>\n<p>Author,<\/p>\n<div dir=\"ltr\"><span style=\"font-size: small\"><strong>Heena Rawal<\/strong><\/span><\/div>\n<p><em>Attack &amp; PenTest Team<\/em><\/p>\n<p><em>Varutra Consulting<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Abstract In this paper, we came up with a basic understanding of Code Obfuscation &#8211; A Code Protection Technology which need anti-reverse engineering transformations to&#8230;<\/p>\n","protected":false},"author":3,"featured_media":17896,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[284,264,262,265,287],"tags":[212,213,214,215,216,217,218],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"Code obfuscation is a code protection technology to harden mobile apps security. Here is a guide towards harden open-source applications and securing the code.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/code-obfuscation\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Code Obfuscation - A Code Protection Technology For Apps\" \/>\n\t\t<meta property=\"og:description\" content=\"Code obfuscation is a code protection technology to harden mobile apps security. Here is a guide towards harden open-source applications and securing the code.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/code-obfuscation\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/03\/Code-Obfuscation-1.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/03\/Code-Obfuscation-1.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t\t<meta property=\"article:section\" content=\"Encryption &amp; Cryptography\" \/>\n\t\t<meta property=\"article:tag\" content=\"anti-reverse engineering\" \/>\n\t\t<meta property=\"article:tag\" content=\"code obfuscation\" \/>\n\t\t<meta property=\"article:tag\" content=\"code obfuscator\" \/>\n\t\t<meta property=\"article:tag\" content=\"code protection\" \/>\n\t\t<meta property=\"article:tag\" content=\"dotfuscator\" \/>\n\t\t<meta property=\"article:tag\" content=\"reverse engineering\" \/>\n\t\t<meta property=\"article:tag\" content=\"security_through_obscurity\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2019-03-26T12:29:55+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T09:52:58+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Code Obfuscation - A Code Protection Technology For Apps\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Code obfuscation is a code protection technology to harden mobile apps security. Here is a guide towards harden open-source applications and securing the code.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/03\/Code-Obfuscation-1.png\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpadmin\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/code-obfuscation\\\/#article\",\"name\":\"Code Obfuscation - A Code Protection Technology For Apps\",\"headline\":\"Code Obfuscation\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Code-Obfuscation-1.png\",\"width\":1200,\"height\":627,\"caption\":\"Code Obfuscation\"},\"datePublished\":\"2019-03-26T12:29:55+05:30\",\"dateModified\":\"2022-12-02T15:22:58+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/code-obfuscation\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/code-obfuscation\\\/#webpage\"},\"articleSection\":\"Encryption &amp; Cryptography, Mobile Application Security, Mobile Device Management, Reverse Engineering, Source Code Review, Anti-reverse engineering, code obfuscation, Code Obfuscator, Code Protection, Dotfuscator, reverse engineering, Security_through_obscurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/code-obfuscation\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/code-obfuscation\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/code-obfuscation\\\/#listItem\",\"position\":2,\"name\":\"Code Obfuscation\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/code-obfuscation\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/code-obfuscation\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/\",\"name\":\"kalpadmin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/code-obfuscation\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpadmin\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/code-obfuscation\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/code-obfuscation\\\/\",\"name\":\"Code Obfuscation - A Code Protection Technology For Apps\",\"description\":\"Code obfuscation is a code protection technology to harden mobile apps security. Here is a guide towards harden open-source applications and securing the code.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/code-obfuscation\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Code-Obfuscation-1.png\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/code-obfuscation\\\/#mainImage\",\"width\":1200,\"height\":627,\"caption\":\"Code Obfuscation\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/code-obfuscation\\\/#mainImage\"},\"datePublished\":\"2019-03-26T12:29:55+05:30\",\"dateModified\":\"2022-12-02T15:22:58+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Code Obfuscation - A Code Protection Technology For Apps<\/title>\n\n","aioseo_head_json":{"title":"Code Obfuscation - A Code Protection Technology For Apps","description":"Code obfuscation is a code protection technology to harden mobile apps security. Here is a guide towards harden open-source applications and securing the code.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/code-obfuscation\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"Code Obfuscation - A Code Protection Technology For Apps","og:description":"Code obfuscation is a code protection technology to harden mobile apps security. Here is a guide towards harden open-source applications and securing the code.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/code-obfuscation\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/03\/Code-Obfuscation-1.png","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/03\/Code-Obfuscation-1.png","og:image:width":"1200","og:image:height":"627","article:section":"Encryption &amp; Cryptography","article:tag":["anti-reverse engineering","code obfuscation","code obfuscator","code protection","dotfuscator","reverse engineering","security_through_obscurity"],"article:published_time":"2019-03-26T12:29:55+00:00","article:modified_time":"2022-12-02T09:52:58+00:00","twitter:card":"summary_large_image","twitter:title":"Code Obfuscation - A Code Protection Technology For Apps","twitter:description":"Code obfuscation is a code protection technology to harden mobile apps security. Here is a guide towards harden open-source applications and securing the code.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/03\/Code-Obfuscation-1.png","twitter:label1":"Written by","twitter:data1":"kalpadmin","twitter:label2":"Est. reading time","twitter:data2":"6 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/code-obfuscation\/#article","name":"Code Obfuscation - A Code Protection Technology For Apps","headline":"Code Obfuscation","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2019\/03\/Code-Obfuscation-1.png","width":1200,"height":627,"caption":"Code Obfuscation"},"datePublished":"2019-03-26T12:29:55+05:30","dateModified":"2022-12-02T15:22:58+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/code-obfuscation\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/code-obfuscation\/#webpage"},"articleSection":"Encryption &amp; Cryptography, Mobile Application Security, Mobile Device Management, Reverse Engineering, Source Code Review, Anti-reverse engineering, code obfuscation, Code Obfuscator, Code Protection, Dotfuscator, reverse engineering, Security_through_obscurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/code-obfuscation\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/code-obfuscation\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/code-obfuscation\/#listItem","position":2,"name":"Code Obfuscation","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/code-obfuscation\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/code-obfuscation\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/","name":"kalpadmin","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/code-obfuscation\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpadmin"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/code-obfuscation\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/code-obfuscation\/","name":"Code Obfuscation - A Code Protection Technology For Apps","description":"Code obfuscation is a code protection technology to harden mobile apps security. Here is a guide towards harden open-source applications and securing the code.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/code-obfuscation\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2019\/03\/Code-Obfuscation-1.png","@id":"https:\/\/www.varutra.com\/varutravrt3\/code-obfuscation\/#mainImage","width":1200,"height":627,"caption":"Code Obfuscation"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/code-obfuscation\/#mainImage"},"datePublished":"2019-03-26T12:29:55+05:30","dateModified":"2022-12-02T15:22:58+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"2352","title":"Code Obfuscation - A Code Protection Technology For Apps","description":"Code obfuscation is a code protection technology to harden mobile apps security. Here is a guide towards harden open-source applications and securing the code.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"Code Obfuscation\",\"score\":90,\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Your H2 and H3 subheadings reflects the topic of your copy. Good job!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase not found in image alt attribute(s). Add an image with your Focus keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}},\"additional\":[{\"keyphrase\":\"Code Protection Technology\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":3},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase not found in image alt attribute(s). Add an image with your Keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}},{\"keyphrase\":\"Code Protection\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase not found in image alt attribute(s). Add an image with your Keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}},{\"keyphrase\":\"Obfuscation\",\"score\":100,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2019\/03\/Code-Obfuscation-1.png","og_image_width":"1200","og_image_height":"627","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Encryption &amp; Cryptography","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:16:26","updated":"2022-12-02 10:05:38"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/encryption-cryptography\/\" title=\"Encryption &amp; Cryptography\">Encryption &amp; Cryptography<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tCode Obfuscation\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Encryption &amp; Cryptography","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/encryption-cryptography\/"},{"label":"Code Obfuscation","link":"https:\/\/www.varutra.com\/varutravrt3\/code-obfuscation\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2352"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=2352"}],"version-history":[{"count":5,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2352\/revisions"}],"predecessor-version":[{"id":20344,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2352\/revisions\/20344"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/17896"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=2352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=2352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=2352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}