隐藏已编译应用程序的可执行代码的实践 [英] Practices for hiding the executable code of compiled applications

查看:79
本文介绍了隐藏已编译应用程序的可执行代码的实践的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

这是对.net程序集进行反编译和反向工程的标准做法。

It's a standard practice to decompile and reverse engineer .net assemblies.

我想发布一些插件程序集,这些程序集将添加到现有应用程序中,但是我不知道不想被别人利用。

I'd like to release some plugin assemblies that will add to existing applications, but I don't want them to be utilized by others.

我可以通过哪些方式隐藏这些程序集的源代码?

What are some ways I can hide the source of these assemblies?

推荐答案

除非您控制目标硬件,否则理论上不可能实现100%的保护。如果CPU在足够的时间和知识下能够执行它,那么人类也可以阅读它。这甚至不限于C#(尽管通常更容易用托管语言进行操作)。您可以使用混淆器(例如Dotfuscator或XenoCode)来使理解反编译的代码更加困难。如果您真的很担心,则应转到基于服务器的应用程序。

It's theoretically impossible to achieve 100% protection unless you control the target hardware. If the CPU is able to execute it, given enough time and knowledge, a human being can read it too. This is not even limited to C# (although it's usually easier to do in managed languages). You can use an obfuscator like Dotfuscator or XenoCode to make it harder to understand the decompiled code. If you're really concerned, you should move to a server-based application.

这篇关于隐藏已编译应用程序的可执行代码的实践的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆