Today, I’m introducing you to ARTful, a native Android library for modifying the Android Runtime (ART) on Android 13 and 14. It’s going to please developers who want to throw a spanner in the works of curious people that like to play with Android apps by analyzing them a little too closely.
The magic of this library lies in its ability to dynamically change the implementation of any static method, eliminating the use of plaintext references and hindering reverse engineering.
To give you a concrete glimpse of what ARTful can do for you, imagine an application where developers want to prevent hackers from poking their noses into their code. With ARTful, they can dynamically modify static methods to make them more resilient to reverse engineering. And that’s it—mission accomplished!
So that everyone can enjoy the benefits of this library, the designers have chosen to make it open source. You can find it on GitHub: ARTful.