Tamper Protection on .NET Assemblies

Many obfuscation tools today offer tamper protection. We gave it a try but it was not applicable in most of our real-world cases.

Does it worth to invest time in this technologies or the added protection level is something that hackers can break in minutes as all the rest?

References:

  • Protect .NET code from reverse engineering?
  • http://www.red-gate.com/products/dotnet-development/smartassembly/features/
  • http://www.9rays.net/Category/55-spicesnet-obfuscator.aspx
  • http://xheo.com/products/code-protection/how-it-works
  • Thanks.


    All code that runs on the client can be changed and tampered with, the tools will only make it a little harder to do. First of all find out if there is a business case in tampering your code anyway. If so, then decide if you should ship it at all or provide the critical code as a service.

    链接地址: http://www.djcxy.com/p/81880.html

    上一篇: 如何锁定已编译的Java类以防止反编译?

    下一篇: .NET组件上的防篡改