Advertisement

.NET Security pp 289-298 | Cite as

Protecting Code

  • Jason Bock
  • Pete Stromquist
  • Tom Fischer
  • Nathan Smith

Abstract

To end this book, I’d like to reverse the course that I’ve followed throughout earlier chapters and show you how to protect your investment by securing your .NET code. I’ll start by briefly covering the basics of the Common Intermediate Language (CIL). Then I’ll explain how you can use this knowledge to reverse-engineer your components. Finally, I’ll discuss techniques that you can use to protect your investments.

Keywords

Native Image Type Int32 Code Source File Return Output Code Obfuscation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Jason Bock, Pete Stromquist, Tom Fischer, and Nathan Smith 2002

Authors and Affiliations

  • Jason Bock
  • Pete Stromquist
  • Tom Fischer
  • Nathan Smith

There are no affiliations available

Personalised recommendations