反编译混淆的Java字节码

反编译混淆的Java字节码

问题描述:

我在运行Java应用程序的平台上工作.这些应用程序经常被混淆,其中大多数使用ProGuard,这使得调试我们平台的问题非常困难.

I work on a platform which runs Java apps. Those apps are often obfuscated, most of them using ProGuard, which makes debugging issues with our platform very difficult.

当前,我正在使用JD( http://java.decompiler.free.fr/ )反编译这些应用. JD做得不错,但是有时生成的代码太难理解了.

Currently I'm using JD (http://java.decompiler.free.fr/ ) to decompile it those apps. JD does a decent job, but sometimes the generated code is too difficult to understand.

发生这种情况的主要原因是,混淆工具利用了JVM字节码的较少约束规范来生成有效的字节码,该字节码没有映射回有效的Java代码(例如:积极的重载).

This appears to happen mainly because obfuscation tools exploit the less constrained spec of JVM Bytecode to produce valid bytecode which doesn't map back to valid Java code (example: aggressive overloading).

所以,我的问题是:是否有专门用于处理混淆后的字节码的反编译器?

So, my question is: is there a decompiler built especially to deal with obfuscated bytecode?

我怀疑任何反编译器都会这样做.但是,您可以使用 ASM 之类的东西来实现自定义字节码转换并重命名重载的方法和变量名.

I doubt any decompilers do that. However you could implement custom bytecode transformation and rename overloaded method and variable names using something like ASM.