en

Obfuscating

Most of business applications has, at some level, intellectual property it is important to protect. The resulting from long hour of work is something we should value and keep as an strategic asset.

.NET Framework platform has some great cross-platform capabilities but they come with a cost. Reverse engineering application data seems not to be that hard (although I never wasted my time trying to tamper any assembly).

A couple of time ago, I had to hide a kind of authorization code residing in a .NET class library. And the question that came was how to keep that information safe.

Encrypting the information is something that comes over the table, but if we use it, we still have to store the key and we go back to the original problem, how to keep that key safe.

The way I see, there are two choices:

  • Secure the key
  • Secure the decryption algorithm

But if we must embed both in our library, the alternative is security through obscurity, meaning we must find a clever way to hide either or both inside our library.

We could use a substitution cypher or mathematical operation. I read many people blaming such approaches, with the argument they are not safe and should not be even considered. In my opinion, security is like quality. High quality or low quality depends on the final usage.

Obfuscators

Obfuscators

Gemalto Sentinel Enveloping may have a good option if you familiar with HASP SRM for licensing. However the way it works does not seems to be what I need because to protect a file with sensitive information, it must wraps the application. As we plan to protect a string that will live inside a library, it seems this will not work for us.

PreEmptive Solutions Dotfuscator is another option. It is FREE for personal use (community edition). You can use post-build commands to obfuscate an assembly after every compilation.

Later we found ConfuserEx wich seems to contain professional results in a free and open source product. After some quick and easy configuratio ont he ConfuserEx UI (there is a command line interface too) I was able to obfuscate my assembly in a point dotPeek was not able to even recognize the assembly.

Written on June 30, 2016