Skip to main content

Configuring the Protection Process

Agile.net is designed to provide a layered protection against IP theft and unauthorized distribution of your code. There are many ways you can configure the protection process; the following section describes the different types of protection operations offered.

  • Code Virtualization — Transforms original code into virtual opcodes that will only be understood by an internal Virtual Machine.
  • Code Encryption — Protects the code itself; replaces method bodies with empty method stubs.
  • Symbol Renaming — Renames classes and methods to unreadable characters.
  • Method Call Obfuscation — Obfuscate all calls even to system libraries and third party controls.
  • String Obfuscation — Encodes strings exposing sensitive data that may be used to analyze your code.
  • Resource Encryption — Encrypts your managed resources.
  • Assemblies Merging — Combines a set of assemblies into a single file.
  • Control Flow Obfuscation — Hides the control flow of your program by transforming code into semantically equivalent but structurally different constructs.
  • Declarative Obfuscation — Uses attributes to control which types and members should or should not be obfuscated.