dotnettraine: Security

Search This Blog

Wednesday, 25 June 2014

Security

                 Unobfuscated managed CIL bytecode can often be easier to reverse-engineer than native code. NET decompiler programs enable developers with no reverse-engineering skills to view the source code behind unobfuscated .NET assemblies (DLL/EXE). In contrast, applications built with Visual C++ are much harder to reverse-engineer and source code is almost never produced successfully, mainly due to compiler optimizations and lack of reflection. One concern is over possible loss of trade secrets and the bypassing of license control mechanisms. To mitigate this, Microsoft has included Dotfuscator Community Edition withVisual Studio .NET since 2002. Third-party obfuscation tools are also available from vendors such as vmwareV.i. LabsXenocodeRed Gate Software. Method-level encryption tools for .NET code are available from vendors such as SafeNet.

No comments:

Post a Comment