Introduction to Active Tamper Defense
Collapse the table of content
Expand the table of content

Introduction to Active Tamper Defense

Dotfuscator and Analytics CE provides a way for your applications to detect and optionally notify you if they have been tampered with since they were instrumented with tamper notification. 

To detect tampering, place InsertTamperCheck attributes on one or more methods in the application that are always executed. When Dotfuscator and Analytics encounters an InsertTamperCheck attribute during its processing, it adds code that performs an assembly level integrity check at runtime. If the integrity check fails, it sends a tamper detected message to the analytics service. It can also call code that exits the application. InsertTamperCheck attributes are not required at runtime; therefore, Dotfuscator and Analytics strips them from the output application.

An application can contain any number of InsertTamperCheck attributes. In the event that an application has been tampered with, multiple tamper detected messages from the same application session will be sent with the same group ID.

Do not put this attribute on the same method containing the Setup Attribute. Methods with this attribute must be executed after the method containing the Setup Attribute.

In Dotfuscator and Analytics CE, InsertTamperCheck attributes may only be placed in assemblies that are EXEs.  Dotfuscator and Analytics CE does not support tamper detection on library assemblies (DLLs).

In this section

Simulating Tampering

Supported .NET Application Types

 

See Also

Show:
© 2016 Microsoft