LogoLogo
  • Welcome to Cyphor
  • .NET Code Obfuscation
    • Getting Started
    • How to Obfuscate
    • Basic Code Obfuscation
      • Symbol Renaming
      • Body Mutation
      • Control Flow
      • Constant Encryption
      • Call Hiding
      • Debug Protection
      • Integrity Checks
      • Self Healing
    • Advanced Obfuscation
      • Attribute-Based Obfuscation
      • Guide to obfuscation
      • Code Inlining
      • What is RASP?
      • Protections that protect each other
      • Program not working after obfuscation
      • Keeping performance with obfuscation
      • Virtualization
  • Dashboard
    • Files
    • Billing
      • Pay as you go
      • Examples
    • Projects
      • Code Guard Tasks
      • Permissions
        • Roles
      • Files
      • SAML and SSO
  • Code Guard
    • Introduction
    • Implement with your licensing system
      • Setting up a gateway
      • Setting up the SDK
    • Secured values
      • Dynamic values
      • Code Encryption
        • Page 1
    • Preventing analysis
    • Enhanced visibility
      • Disabling tracing on production
      • Logging external methods
      • Optimizing Memory Usage
    • Edge connectivity
    • Preventing modifications
      • Preventing assembly load
      • Allowing partial tampering
      • Enterprise EDRs and XDRs
      • Dynamic Hook protection
      • Thread hijacking
      • Guard Checksums
      • DLL Injection
      • Handling complex RE attacks
        • Custom payload detection
    • Granular Integrity Checks
    • Virtualized Environments
    • Troubleshooting
    • Threat database
    • Real time alerts
      • Alert Insights
  • CLI Tool
    • Introduction
    • Global options
    • Profiles
    • Projects
    • Obfuscator
      • Obfuscation Schemes
      • Task templates
      • Protecting files
        • Global obfuscation flags
        • Using templates to obfuscate files
        • Quick obfuscation
      • Monitoring obfuscation jobs
    • Securing local storage
Powered by GitBook
On this page

Was this helpful?

  1. Code Guard

Preventing modifications

Tampering is a common threat to the security of software applications, and can occur in two forms: statically or dynamically.

Static tampering occurs when an attacker has modified the application and attempts to run it. Our system is able to identify and classify different types of static tampering, providing detailed information on which parts of the application have been modified.

Dynamic tampering occurs when an attacker attempts to modify the behavior of the program at runtime. The most common technique used for this is memory hooking, where the attacker modifies the code in memory to change the process flow and behavior of the program.

To protect against dynamic tampering, our system offers the following actions:

  • Remediation: Our tamper protection will remove any placed hooks and revert any changes made to the process memory, restoring the program to its original state.

  • Log: Our system will detect the attack and notify you, providing detailed information on the nature and source of the tampering attempt.

  • Exit: The process will crash, preventing the attacker from accessing or manipulating the program.

In addition to these actions, you can also set up the appropriate response to take against the customer or license through the dashboard. This allows you to control and manage any potential threats to the security of your application.

PreviousEdge connectivityNextPreventing assembly load

Last updated 1 year ago

Was this helpful?