Code Obfuscation (to prevent reverse-engineering) techniques/tools suitable for EAR files
We have built our Fusion ADF application using Oracle Jdeveloper(12.2.1.2). The Application includes - Oracle ADF Desktop Integration, Oracle ADF Security, Oracle ADF Web service data control, Oracle ADF remote task-flows, Oracle ADF Business Component’s Service Interfaces, Oracle ADF Data Controls for BI, Integration with Oracle Fusion Middleware features such as MDS, OPSS, OWSM, High Availability and Clustering.
The extension files that we're using in our application includes - .java( for beans,POJOs), .js, .html, .css, .jspx, .jsf, .jsff, .xml(mostly for task-flows and pageDefinitions), wsdl (webservices calls), .cpx(page definitions), .properties, .jpx
Functionality wise - lots of db connections, webservices calls, page flows, page definitions, page fragments, task flows, skins, we have various jar files too.