Thanks! I look forward to poking around, looking at how it does
register allocation, etc.

For Java byte codes, I use this decompiler, which produces source code
which is usually compilable: http://java.decompiler.free.fr/

It even integrates nicely into Eclipse.

In my experience, it usually even does something reasonable with code
that's been obfuscated with Proguard, though it can't always turn it
back into Java code -- sometimes it shows you bits of disassembled
byte code instead.  But, to return to the original topic of this
thread...you can't really prevent reverse engineering.

No doubt, eventually Android will have a similar tool. But disassembly
is plenty good enough to reverse-engineer things.

On Mar 3, 7:16 pm, fadden <fad...@android.com> wrote:
> On Mar 3, 6:09 am, Bob Kerns <r...@acm.org> wrote:
>
> > Re: JDASM -- that works on standard Java byte codes -- which aren't
> > present on the device. Still... I don't know of one that reads
> > Dalvik's byte codes, but I don't know of any reason it would be any
> > harder to write.
>
> Try Smali:http://code.google.com/p/smali/

-- 
You received this message because you are subscribed to the Google
Groups "Android Developers" group.
To post to this group, send email to android-developers@googlegroups.com
To unsubscribe from this group, send email to
android-developers+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/android-developers?hl=en

Reply via email to