yFiles Obfuscation Demo

This demo shows how to obfuscate the yFiles classes before they can be deployed as a part of an applet or application. Obfuscation changes class, field, and method names in a consistent but nonsensical way that does not change the functionality of the software but makes decompiled Java code harder to read and publicly available API description of the original code inapplicable to the obfuscated code.

In this demo the obfuscation process will be performed by the Ant-based obfuscator yGuard. In order to run yGuard it is required to have the freely available deployment tool Ant installed on your system.

The sample application used in this obfuscation demo is demo.view.hierarchy.HierarchyDemo.

This demo contains the following files:

build.xml The Ant build script used to obfuscate the application.
yGuard The yGuard obfuscation task. The newest yGuard version can be freely obtained from the yGuard home page.

Running the Demo

Open a console window and change to this directory. Then enter "ant run". This will launch the obfuscated application. Before the application will be run it first will be compiled, jarred, and obfuscated.

Enter "ant show" to open up a small browser that shows the name mapping performed by the obfuscator.