LogoLogo
  • Welcome to Cyphor
  • .NET Code Obfuscation
    • Getting Started
    • How to Obfuscate
    • Basic Code Obfuscation
      • Symbol Renaming
      • Body Mutation
      • Control Flow
      • Constant Encryption
      • Call Hiding
      • Debug Protection
      • Integrity Checks
      • Self Healing
    • Advanced Obfuscation
      • Attribute-Based Obfuscation
      • Guide to obfuscation
      • Code Inlining
      • What is RASP?
      • Protections that protect each other
      • Program not working after obfuscation
      • Keeping performance with obfuscation
      • Virtualization
  • Dashboard
    • Files
    • Billing
      • Pay as you go
      • Examples
    • Projects
      • Code Guard Tasks
      • Permissions
        • Roles
      • Files
      • SAML and SSO
  • Code Guard
    • Introduction
    • Implement with your licensing system
      • Setting up a gateway
      • Setting up the SDK
    • Secured values
      • Dynamic values
      • Code Encryption
        • Page 1
    • Preventing analysis
    • Enhanced visibility
      • Disabling tracing on production
      • Logging external methods
      • Optimizing Memory Usage
    • Edge connectivity
    • Preventing modifications
      • Preventing assembly load
      • Allowing partial tampering
      • Enterprise EDRs and XDRs
      • Dynamic Hook protection
      • Thread hijacking
      • Guard Checksums
      • DLL Injection
      • Handling complex RE attacks
        • Custom payload detection
    • Granular Integrity Checks
    • Virtualized Environments
    • Troubleshooting
    • Threat database
    • Real time alerts
      • Alert Insights
  • CLI Tool
    • Introduction
    • Global options
    • Profiles
    • Projects
    • Obfuscator
      • Obfuscation Schemes
      • Task templates
      • Protecting files
        • Global obfuscation flags
        • Using templates to obfuscate files
        • Quick obfuscation
      • Monitoring obfuscation jobs
    • Securing local storage
Powered by GitBook
On this page
  • Obfuscation Metrics
  • Performance
  • Resilience
  • Potency

Was this helpful?

  1. .NET Code Obfuscation

Basic Code Obfuscation

Obfuscation is the main feature that distinguish our service.

PreviousHow to ObfuscateNextSymbol Renaming

Last updated 1 year ago

Was this helpful?

Obfuscation Metrics

Our online panel and documentation show up to three different metrics, they are important as they help to measure the obfuscation quality and repercussion the applied techniques will have in your protected files.

Performance

The performance metric reassembles the overall cost that an obfuscation technique has on your file, this includes but is not limited to: execution time, compilation time and, size of the new code.

Resilience

Resilience measures how persistent an obfuscation technique is. In most scenarios obfuscation transformations can be reversed, resilience measures how strong a feature is against attacks that aim to automate the removal of the protection (commonly known as deobfuscators).

Some features, such as Symbol renaming or Code Inlining/Outlining have the highest level of resilience, the reason for this is due to the fact they can't be reverted back to their original shape.

Potency

Potency measures the complexity that your code has after obfuscation, this metric is targeting humans as attack vectors. In order to calculate this metric, we took advantage of some existing algorithms that measure how complicated code is to the human eye. and .

There are exceptions to this measure, for example, some of our features might encrypt your code or parts of it, this makes the potency the highest level possible as the code is not even readable for the human eye.

⚖️
⏩
🧠
🔐
Cyclomatic complexity
Halstead complexity