DeployLX CodeVeil performs a complete analysis of the entire application to identify all explicit and implicit dependencies, standard naming conventions and serialization requirements.
With this detailed information, CodeVeil can eliminate un-needed meta-data, overload obfuscated names, and even generate non-displayable zero-width names. All without breaking the existing app.
CodeVeil will even disguise calls to third party assemblies and the .NET framework.
While most passive obfuscation techniques stop protecting your application once delivered, DeployLX CodeVeil remains active. Taking aggressive measures to actively interfere with the efforts of hackers to debug, tamper and reverse engineer your protected assemblies.
The Runtime Executive uses innovative techniques to corrupt debugger internal structures and interfere with static code analysis.
DeployLX looks at the entire application and protects assemblies as a whole rather than protecting assemblies individually.
By considering the entire application, CodeVeil can obfuscate public types and members exposed by one assembly and consumed by another.
DeployLX CodeVeil was the first to offer .NET assembly encryption. Now with advanced runtime injection, API redirects and just-in-time decryption, protected applications are never decrypted in memory.
CodeVeil's Runtime Executive decrypts just enough for the .NET runtime to execute a specific method, then deletes it from memory. The original assembly is never decrypted in memory.