ILDASM and Obfuscation in .NET
page 5 of 7
by Sandeep Acharya
Feedback
Average Rating: 
Views (Total / Last 10 Days): 36887/ 69

Obfuscation is based upon

The obfuscation process is not built on a very new concept. If someone is asked to hide something (still making it publicly accessible), then the way is encryption and decryption. The encryption is nothing but converting an understandable language to a non-understandable language; decryption is just the vice versa. However, the method for encrypting data may not be identical to decryption. So there exists a one-to-one relation between the data to be encrypted and the encrypted presentation of data.

The Obfuscators used to work in almost a similar fashion (How they differ: Obfuscators really do not need decryptions) as we have just discussed above. Obfuscation is a general word used for protecting programming codes and not the general data. This has become very much popular in recent years as languages like Java and .NET gained their popularities. Unlike C or C++ (where we are directly getting the machine codes), in modern languages we are getting an intermediate stage which makes reverse engineering easier. And it already helped many hackers to bypass the license, take the pieces out of the programs, steal them and make it own.

Here is a point for those who are still thinking that Obfuscators are the same as the encryption and decryption process. It is not exactly like that. Actually, the obfuscators do not need decryptions. An obfuscated program keeps staying in plain view, but reaches far away from human beings/hackers. An obfuscated program runs much faster than the normal programs as few optimizations are also getting associated in the process of obfuscation.


View Entire Article

User Comments

Title: What Actually Is ILDASM   
Name: Babu Shekar
Date: 2010-02-12 6:06:30 AM
Comment:
Thanks Sandeep Acharya!! this article provides an detailed explanation of the topic with pictorical representation. It is really great piece of explanation.
Title: Nice!!   
Name: Venkata Polepalli
Date: 2008-11-12 6:36:19 AM
Comment:
Hi Sandeep!!

Its Good Artical for Explaining the Obfuscation!!
Title: Thanks   
Name: Rupesh kumar Tiwari
Date: 2007-10-05 7:51:13 AM
Comment:
Thanks Sandeep ji.
After reading this article I got a clear picture about the Ildasm.
You could have thrown some more light on Obfuscating. Still, the diagram is explaining things clearly.
Title: Thanks   
Name: Chandrakanta
Date: 2007-01-18 1:40:10 AM
Comment:
This is a very Nice Article For the developers those are working on this technology.

Product Spotlight
Product Spotlight 





Community Advice: ASP | SQL | XML | Regular Expressions | Windows


©Copyright 1998-2024 ASPAlliance.com  |  Page Processed at 2024-04-24 2:17:31 AM  AspAlliance Recent Articles RSS Feed
About ASPAlliance | Newsgroups | Advertise | Authors | Email Lists | Feedback | Link To Us | Privacy | Search