Because android app is based on Java, it is very easy to be cracked. An app without reinforcement is like running naked, unprepared. Previously, there were news reports that some full-time app packaging gangsters found apks from various channels, cracked and decompiled the APK files through various cracking methods, then added advertisements and virus codes, and repackaged them to the market. Unidentified users downloaded the APK with virus advertisements, and even caused loss of profits.
For mobile application development engineers, application automation reinforcement is undoubtedly the most convenient way of security. Through the reinforcement, we can achieve the effect of decompiling and preventing from being re packaged to a certain extent. Of course, many online platforms now provide reinforcement services, including bat. The principle of reinforcement is similar, but the strength and compatibility of reinforcement are quite different.
The author took time to sort out some apps over the weekend to evaluate the application of reinforcement platforms of several popular companies with good reputation. This time, five platforms and one app were selected. At the same time, after the first time of the application, we compare the reinforcement time with the size of the application.
The following are five reinforced platforms evaluated and compared:
1.360 reinforced link protection http://jiagu.360.cn/
2. Aliju security link http://jaq.alibaba.com/
3. Tencent cloud application LEGO link https://www.qcloud.com/product/cr.html
4. Bangbang safe link http://www.bangcle.com/
5. Tongfudun Mobile Security Cloud link http://www.appfortify.cn/pc-index.html
Easy to operate
First of all, the application will be reinforced in the selected 5 platforms. The selected application is charm Hui, with a size of 16MB. The whole process of reinforcement comes down, all are free to use. Of course, some of them have advanced reinforcement of paid version, which is not in the scope of evaluation this time.
The reinforcement process of 360 is similar to that of aliju. There are many options before reinforcement, such as log analysis, x86 architecture, application upgrade notice, and signature selection.
If it is an authentication user can choose an existing application or upload a new application to directly start the reinforcement, the operation process is very smooth. Reinforcement will prompt the application for malicious code detection, which is very humanized. After reinforcement, download the file and sign again to release. In addition, online multi-channel reinforcement can be selected, which is more suitable for users with multiple publishing channels.
Tencent cloud application LEGO
After Tencent cloud’s reinforcement upload application, it selects reinforcement, vulnerability detection and channel monitoring by default. The alternative is adaptation analysis, which is limited to once a day.
Bang Bang Bang safety
The overall process of Bangbang is similar to that of others. You can choose whether safety assessment and application reinforcement are carried out at the same time.
For the enhanced interface of Tongfu shield, select the application to upload, select the service and click Submit.
Summary: there will be no operation problems after using the five platform reinforcement functions, mainly because the steps and processes are too similar. From the perspective of user experience, the design of Tencent cloud and tongfudun will be better. After the reinforcement is completed, there will be download and provision of signature tools, which is more thoughtful.
Comparison of indexes before and after reinforcement
Comparison of reinforcement waiting time
The reinforcement waiting time is also recorded in this comparison. For the same application, the consolidation time of the same application on different platforms is very different. The fastest one is aliju security. It takes 27 seconds for 16MB application and 3:08 seconds for Tongfu shield. Of course, the difference in time is not the same as the reinforcement of the engine, but also may be related to the reinforcement strength and reinforcement project.
Volume comparison before and after reinforcement
The security reinforcement of aliju makes the application package smaller by 1MB, and the other several have a floating range of 0-0.8mb.
Comparison of initial starting speed before and after reinforcement
Generally speaking, the first start-up speed will be slightly affected after reinforcement, but the second start-up will be normal. Through the third-party compatibility test of testin, the compatibility of the application output from these five platforms after signing is not different. This test covers 100 mainstream mobile phones. The test results are as follows:
The speed of reinforcement of each platform is slower than that of the other four after reinforcement. One of the biggest impact on speed is bang bang safety.
Comparison of compatibility before and after reinforcement
The compatibility of applications is also a very important indicator. Through this evaluation, it can be found that the compatibility of the tested application is greatly reduced by 88% after the application is reinforced by pass through shield. The other four have not changed much.
Finally, let’s have a summary of the statistical table to see which platforms have won the first place in these indicators
In particular, if the application market chooses the 360 development platform, it is not allowed to use the reinforcement functions of other brands. This experience will not be very good. At present, the whole reinforcement market is similar from this sample analysis. If you want to choose reinforcement products, you can focus on the compatibility after reinforcement and start-up speed.
Finally, I want to explain that this reinforcement uses the free version of automatic reinforcement. At present, each platform also provides some API or higher strength reinforcement scheme. However, as far as the current reinforcement technology is concerned, there are still some methods for application shelling. For application safety, in addition to reinforcement, other methods can be combined. For example, in the application of embedded security components, data encryption and logic confusion this way.