LogoLogo
  • Welcome to Cyphor
  • .NET Code Obfuscation
    • Getting Started
    • How to Obfuscate
    • Basic Code Obfuscation
      • Symbol Renaming
      • Body Mutation
      • Control Flow
      • Constant Encryption
      • Call Hiding
      • Debug Protection
      • Integrity Checks
      • Self Healing
    • Advanced Obfuscation
      • Attribute-Based Obfuscation
      • Guide to obfuscation
      • Code Inlining
      • What is RASP?
      • Protections that protect each other
      • Program not working after obfuscation
      • Keeping performance with obfuscation
      • Virtualization
  • Dashboard
    • Files
    • Billing
      • Pay as you go
      • Examples
    • Projects
      • Code Guard Tasks
      • Permissions
        • Roles
      • Files
      • SAML and SSO
  • Code Guard
    • Introduction
    • Implement with your licensing system
      • Setting up a gateway
      • Setting up the SDK
    • Secured values
      • Dynamic values
      • Code Encryption
        • Page 1
    • Preventing analysis
    • Enhanced visibility
      • Disabling tracing on production
      • Logging external methods
      • Optimizing Memory Usage
    • Edge connectivity
    • Preventing modifications
      • Preventing assembly load
      • Allowing partial tampering
      • Enterprise EDRs and XDRs
      • Dynamic Hook protection
      • Thread hijacking
      • Guard Checksums
      • DLL Injection
      • Handling complex RE attacks
        • Custom payload detection
    • Granular Integrity Checks
    • Virtualized Environments
    • Troubleshooting
    • Threat database
    • Real time alerts
      • Alert Insights
  • CLI Tool
    • Introduction
    • Global options
    • Profiles
    • Projects
    • Obfuscator
      • Obfuscation Schemes
      • Task templates
      • Protecting files
        • Global obfuscation flags
        • Using templates to obfuscate files
        • Quick obfuscation
      • Monitoring obfuscation jobs
    • Securing local storage
Powered by GitBook
On this page
  • What are virtualized environments?
  • Preventing virtualized environments.
  • Allowing virtualized environments.

Was this helpful?

  1. Code Guard

Virtualized Environments

What are virtualized environments?

Virtualized environments are software-based simulations of physical computing environments that allow multiple operating systems and applications to run on the same physical hardware.

This enables users to run multiple applications and operating systems simultaneously. However, running commercial applications on virtualized environments can pose several risks, particularly when facing tampering and cracking attacks.

Preventing virtualized environments.

In some cases, it makes sense to prevent commercial applications from running on virtualized environments. This is especially true if the application is likely to face cracking, tampering, and reverse engineering attacks. In these cases, allowing the application to run on a virtualized environment can make it easier for attackers to bypass security measures and gain unauthorized access to the application.

However, there are also cases where it is best to allow commercial applications to run on virtualized environments. For example, if the application is being used for testing or development purposes, running it on a virtualized environment can be useful for isolating it from other applications and preventing conflicts.

Allowing virtualized environments.

Some users may rely on virtualized environments for accessibility purposes. For example, users with low vision may use a virtual machine to run an application that is not compatible with their screen reader. In these cases, preventing the application from running on a virtualized environment can make it inaccessible to these users.

Overall, the decision to prevent applications from running on virtualized environments should be based on the specific needs and risks of the application in question. It is always important to consider the potential impact on security and accessibility when making this decision.

PreviousGranular Integrity ChecksNextTroubleshooting

Last updated 1 year ago

Was this helpful?