Control Flow
Last updated
Last updated
Control flow obfuscation is a technique used to make the control flow of a program difficult to understand and reverse engineer.
This is achieved by transforming the original code in such a way that the control flow becomes harder to follow, while preserving the functionality of the program.
There are several reasons why control flow obfuscation is a good idea for C# or .NET applications. First, it can help protect the intellectual property of the code, making it more difficult for others to understand and potentially steal. Second, it can make it harder for attackers to reverse engineer the code and find vulnerabilities to exploit. Third, it can make it more difficult for malicious actors to create functional copies of the application.
By default, the Control Flow Obfuscation that we provide has little to no impact on performance, the reason is, the challenges and arithmetic's added on the default settings are easily solved by the JIT Compiler. These settings, however, also reduce the complexity of obfuscation.
If you want to trade performance for security, you can do so by using the parameters present in the protection.
Mangling complexity measures how many times, the pathing of your application is obscured. This means that the control flow of your application is obfuscated multiple times, ensuring the most resilience against automatic tools (deobfuscators).
Using a number higher than 3 can worsen the performance exponentially. If you want to safeguard your code to the maximum, check Virtualization.
Expression density sets how complex the generated arithmetic expressions are. You can change this setting if you want to enhance the potency of the method and generate an uglier code when your application is decompiled.
Expression density sets how complex the logical expressions are. You can change this setting if you want to enhance the potency and resilience of the method and generate an uglier code when your application is decompiled.
The enhanced mode enables a set of techniques that obscure the pathing of the obfuscated app. This is done by adding a new layer of encryption that protects the opaques and expressions present in the application.