In this post we detail a method to improve analysis of Java code for a particular obfuscator, we document the process that was followed and demonstrate the results of automating our method. Obscurity will not stop an attacker and once the method is known, methodology can be developed to automate the process
more here.........http://www.contextis.com/resources/blog/automating-removal-java-obfuscation/
more here.........http://www.contextis.com/resources/blog/automating-removal-java-obfuscation/