Solved

stop reflection

Posted on 2004-09-22
3
470 Views
Last Modified: 2008-02-26
Is there a simple way to prevent people from using a tool such as Reflector to disassembled .NET assemblies?

In our code, we use reflection sometimes to invoke methods of our own assemblies, and this we'd like to permit from within our own assemblies. But as for other people using tools, is there a way to prevent them from peeking at the code?

Thanks
0
Comment
Question by:gregasm
3 Comments
 
LVL 4

Accepted Solution

by:
jrandallsexton earned 300 total points
ID: 12125749
As far as I know, obfuscation is the only means of preventing reverse engineering.

Check out this utility from Microsoft, it should help you out.  I personally have not tried it.

http://www.gotdotnet.com/team/dotfuscator/


0
 
LVL 4

Assisted Solution

by:vigrid
vigrid earned 200 total points
ID: 12128141
Another hardcore method would be to encrypt your DLL assemblies and load them via some kind of decrypting stream and then use reflection :D. Oh, you need to store the key to decrypt the file, so this method sucks. Or you can use an USB token with own memory to store the key... What do you want to protect?
0
 
LVL 8

Author Comment

by:gregasm
ID: 12129044
Thanks.

What do I want to protect? Just to prevent reverse engineering.
0

Featured Post

Master Your Team's Linux and Cloud Stack!

The average business loses $13.5M per year to ineffective training (per 1,000 employees). Keep ahead of the competition and combine in-person quality with online cost and flexibility by training with Linux Academy.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us here at EE write code. Many of us write exceptional code; just as many of us write exception-prone code. As we all should know, exceptions are a mechanism for handling errors which are typically out of our control. From database errors, t…
A long time ago (May 2011), I have written an article showing you how to create a DLL using Visual Studio 2005 to be hosted in SQL Server 2005. That was valid at that time and it is still valid if you are still using these versions. You can still re…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question