The Artima Developer Community
Sponsored Link

.NET Buzz Forum
Code Signing as Reverse Engineering Protection

0 replies.

Welcome Guest
  Sign In

Go back to the topic listing  Back to Topic List Click to reply to this topic  Reply to this Topic Click to search messages in this forum  Search Forum Click for a flat view of this topic  Flat View
Previous Topic   Next Topic
Threaded View: This topic has 0 replies on 1 page
David Cumps

Posts: 319
Nickname: cumpsd
Registered: Feb, 2004

David Cumps is a Belgian Student learning .NET
Code Signing as Reverse Engineering Protection Posted: Sep 15, 2007 4:17 PM
Reply to this message Reply

This post originated from an RSS feed registered with .NET Buzz by David Cumps.
Original Post: Code Signing as Reverse Engineering Protection
Feed Title: David Cumps
Feed URL: http://weblogs.asp.net/cumpsd/rss?containerid=12
Feed Description: A Student .Net Blog :p
Latest .NET Buzz Posts
Latest .NET Buzz Posts by David Cumps
Latest Posts From David Cumps

In my last post I spoke about reverse engineering .NET assemblies upon which Gregory asked how to protect his code against it.

Initially I thought signing an assembly would be the easiest way to prevent this, and my first tests confirmed this. I signed the CrackMe from my previous post and tried modifying it again, unsuccessfully.

But in the end Code Signing your assembly proved to be useless against reverse engineering.

Strong Name Remove

Read more at http://blog.cumps.be/code-signing-as-reverse-engineering-protection/

Read: Code Signing as Reverse Engineering Protection


Topic: SilvrGame: Ein Silverlight Spiele-Projekt Previous Topic   Next Topic Topic: Matura, dum libido manet ...

Sponsored Links



Google
  Web Artima.com   

Copyright © 1996-2019 Artima, Inc. All Rights Reserved. - Privacy Policy - Terms of Use