Last week we took a look at various methods of tamper proofing .NET assemblies, breaking it down into three primary methods:
- Hash checking - checking your assemblies hash to ensure unchanged
- Result checking - checking results of calculations throughout your assembly
- Encryption - encrypting your assemblies before deployment
Over the next few weeks I'll discuss an implementation of injecting tamper proof techniques into your assemblies using NCloak. To make things simple, we'll simply be using encryption and hash checking to detect any tampering of assemblies.