Smart Assembly leverages the Windows API (https://learn.microsoft.com/en-us/dotnet/framework/unmanaged-api/strong-naming/strongnamesignatureverificationex-function) to verify tamper-protected assemblies are present and their signatures are unaltered.
When this is enabled, should any altered assemblies attempt to be loaded by the CLR, the OS will throw a warning that the patterns don't match.
Anti-tampering is intended to guard against supply chain attacks, it doesn't prevent binary disassembly.
0
0
Was this article helpful?
0 out of 0 found this helpful
Articles in this section
- What does Smart Assembly tamper protection do?
- This application has been built with SmartAssembly Personal Edition, and therefore cannot be distributed
- File is not recognized as a valid URI
- This SNK format is not supported
- What version of SmartAssembly was used to obfuscate my assembly?
- Using LocalDB with SmartAssembly
Add comment
Please sign in to leave a comment.