• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1# Overview of ArkGuard for Bytecode Obfuscation
2
3ArkGuard offers basic bytecode obfuscation capabilities, transforming function names, class names, file names, and other identifiers into short, meaningless names, making it more difficult to infer the purpose of the code through inspection. In addition, the shortened names in the obfuscated bytecode sometimes help reduce the package size.
4
5This section describes how to use ArkGuard. It aims to assist you in efficiently applying obfuscation to your bytecode, thereby increasing its complexity and making reverse engineering more challenging.
6
7Compared with source code obfuscation, bytecode obfuscation targets bytecode files.
8
9- [ArkGuard Principles and Capabilities for Bytecode Obfuscation](bytecode-obfuscation.md): describes the scope of obfuscation capabilities (including default obfuscation features), obfuscation process, usage of various obfuscate and keep options, and strategies for merging obfuscation rules. It also discusses the limitations of ArkGuard in different language environments.
10
11- [Using ArkGuard for Bytecode Obfuscation](bytecode-obfuscation-guide.md): offers step-by-step instructions on enabling bytecode obfuscation, setting custom obfuscation rules, and viewing obfuscation effects. It also explains how to perform stack trace deobfuscation in case of errors.
12
13- [Package-specific Bytecode Obfuscation Recommendations](bytecode-obfuscation-practice.md): provides tailored obfuscation strategies for different package types, such as HAP, HAR, and HSP.
14
15- [Common Issues with ArkGuard in Bytecode Obfuscation](bytecode-obfuscation-questions.md): describes the [differences between bytecode obfuscation and source code obfuscation](bytecode-obfuscation-questions.md#differences-between-bytecode-obfuscation-and-source-code-obfuscation), summarizes common issues encountered during obfuscation, along with troubleshooting methods and solutions for typical error cases. It aims to help you quickly identify and resolve problems that arise during obfuscation.
16