LogoLogo
  • Welcome to Cyphor
  • .NET Code Obfuscation
    • Getting Started
    • How to Obfuscate
    • Basic Code Obfuscation
      • Symbol Renaming
      • Body Mutation
      • Control Flow
      • Constant Encryption
      • Call Hiding
      • Debug Protection
      • Integrity Checks
      • Self Healing
    • Advanced Obfuscation
      • Attribute-Based Obfuscation
      • Guide to obfuscation
      • Code Inlining
      • What is RASP?
      • Protections that protect each other
      • Program not working after obfuscation
      • Keeping performance with obfuscation
      • Virtualization
  • Dashboard
    • Files
    • Billing
      • Pay as you go
      • Examples
    • Projects
      • Code Guard Tasks
      • Permissions
        • Roles
      • Files
      • SAML and SSO
  • Code Guard
    • Introduction
    • Implement with your licensing system
      • Setting up a gateway
      • Setting up the SDK
    • Secured values
      • Dynamic values
      • Code Encryption
        • Page 1
    • Preventing analysis
    • Enhanced visibility
      • Disabling tracing on production
      • Logging external methods
      • Optimizing Memory Usage
    • Edge connectivity
    • Preventing modifications
      • Preventing assembly load
      • Allowing partial tampering
      • Enterprise EDRs and XDRs
      • Dynamic Hook protection
      • Thread hijacking
      • Guard Checksums
      • DLL Injection
      • Handling complex RE attacks
        • Custom payload detection
    • Granular Integrity Checks
    • Virtualized Environments
    • Troubleshooting
    • Threat database
    • Real time alerts
      • Alert Insights
  • CLI Tool
    • Introduction
    • Global options
    • Profiles
    • Projects
    • Obfuscator
      • Obfuscation Schemes
      • Task templates
      • Protecting files
        • Global obfuscation flags
        • Using templates to obfuscate files
        • Quick obfuscation
      • Monitoring obfuscation jobs
    • Securing local storage
Powered by GitBook
On this page
  • Performance: High Potency: Low Resilience: High
  • Understanding the protection

Was this helpful?

  1. .NET Code Obfuscation
  2. Basic Code Obfuscation

Self Healing

PreviousIntegrity ChecksNextAdvanced Obfuscation

Last updated 3 years ago

Was this helpful?

Performance: High Potency: Low Resilience: High

Understanding the protection

Self Healing relies on redundancy to ensure the integrity of your application.

The code marked to be protected will be cloned in multiple regions of your application, if tampering is found, our runtime agents will redirect the flow of your program to any of the non-tampered solutions.

In the event of all functions being compromised, the RASP checks will take over mitigating all active threats.

Due to the nature of this protection, we strongly advise using on the methods or types you want to be protected.

This protection is currently in BETA stage, if you wish to enable it in your account, contact your account manager to have it activated.

⏩
🔐
🧠
🆙
🛡️
Attributes