of execution is hard to discern when reading through the decompiled
source.
■■
Illegal programming constructs may be introduced, such as unreach-
able statements, and code paths with missing return statements. Most
JVMs will tolerate these phenomena in bytecode, but the decompiled
source cannot be recompiled without correcting the illegal code.
HACK STEPS
Effective tactics for coping with bytecode obfuscation depend upon the
techniques used and the purpose for which you are analyzing the source. Here
are some suggestions:
■
You can review an applet for public methods without fully understanding
Do'stlaringiz bilan baham: