Tamper Proofing - an implementation (Part 1) : Paul Mason

added by tivit
2/11/2010 9:22:37 PM


Last week we took a look at various methods of tamper proofing .NET assemblies, breaking it down into three primary methods: * Hash checking - checking your assemblies hash to ensure unchanged * Result checking - checking results of calculations throughout your assembly * Encryption - encrypting your assemblies before deployment Over the next few weeks I'll discuss an implementation of injecting tamper proof techniques into your assemblies using NCloak. To make things simple, we'll simply be using encryption and hash checking to detect any tampering of assemblies.