Click here to Skip to main content
16,020,261 members
Articles / Programming Languages / MSIL

Protect Your Source Code from Decompiling or Reverse Engineering .NET Assemblies

Rate me:
Please Sign up or sign in to vote.
4.92/5 (53 votes)
5 Nov 2016Ms-PL3 min read 181.2K   86   38
How to protect your source code from decompiling or reverse engineering

Many developers are still not aware that Portable Executable (PE) files can be decompiled to readable source code. Before learning how to prevent or make it hard for the decompilers to reverse engineer the source code, we need to understand a few basic concepts.

What is a Portable Executable file?

When source code is complied, it generates a Portable Executable (PE) file. Portable Executable (PE) is either a DLL or an EXE. PE file contains MSIL (Microsoft Intermediate Language) and Metadata. MSIL is ultimately converted by CLR into the native code which a processor can understand. Metadata contains assembly information like Assembly Name, Version, Culture and Public Key.

How Can We Get Source Code from DLL or EXE?

Yes, we can get the source code from DLL or EXE. To demonstrate this, let's create a simple application first.

Open Visual Studio, create a new project and select console based application.

image

Add some sample code into the Program.cs:

C#
using System;
 
namespace MyConsoleApp
{
  internal class Program
  {
    private static void Main(string[] args)
    {
      Console.WriteLine(PublicMethod());
      Console.WriteLine(PrivateMethod());
    }
 
    public static string PublicMethod()
    {
      // Your source code here
      return "Public Method";
    }
 
    private static string PrivateMethod()
    {
      // Your source code here
      return "Private Method";
    }
  }
}

Now build the application, an EXE will be generated in the bin/debug folder:

image

Now let's try to get the source code from the EXE file. For the first, open Visual Studio command prompt.

image

Type ildasm and hit enter. ILDASM is MSIL Disassembler. It basically has an ability to read Intermediate Language.

image

ILDASM will open, now open the EXE file we created.

image

As we can see, ILDASM disassembles the EXE and lots of useful information can be retrieved, though it does not provide the original source code completely, a lot can be interpreted. The easy way to reverse engineer and get the exact source code is that there are decompliers available in the market for free such as Telerik JustDecompile and Jet Brains dotPeek which can convert the Intermediate Language into the original source code.

image

As we can see in the above screenshot when we open the EXE with Telerik JustDecompile, we are able to see the original source code. This can lead to piracy and ultimately you can lose your profits.

How to Prevent EXE and DLL from Getting Decompiled?

The process of protecting the EXE and DLL from getting decompiled into the original source code is called Obfuscation. There are a lot of paid and free software available to Obfuscate the .NET assemblies, Dotfucator from PreEmptive Solutions is one of the popular ones and their community edition is free and included with Visual Studio. If you are interested in buying other versions, check out this comparison. The Dofuscator community edition has limited features and the professional edition is very expensive. So instead of gaining profits by protecting them from reverse engineering, we will end up spending a lot on Obfuscation.

One of the best alternate utilities for obfuscating is ConfuserEx. It is completely free and opensource. You can download ConfuserEx from here.

After downloading, extract the zip into a folder and then run ConfuserEx.exe.

image

Drag and drop the EXE you want to protect on the ConfuserEx or you can manually select Base Directory, Output Directory and add the DLL or EXE.

image

Once you are done setting up the directories and adding DLL or EXE, go to the Settings tab in ConfuserEx. You can either add rules to Gobal settings or set individually for each DLL or EXE.

image

Click on “+” button, you will see “true” under Rules. Now click on edit rule (button below “-”).

image

On clicking edit rule, a new window will appear as shown below. Click on “+” button.

image

You can select different ways to add levels of protection. If you want to learn Obfuscation in depth, check out this article.

image

Select only with “Anti IL Dasm” and “Anti Tamper”, that is enough for making it hard enough to reverse engineer for the decompilers.

image

After you click on Done, go to Protect tab and click on Protect button.

image

image

You can find the protected DLL or EXE in the output directory selected.

image

Test the EXE or DLL generated by ConfusedEx and check if it is working as usual. Now try to decompile it with a decompiler.

image

As we can see, the confused DLL or EXE which gets generated by ConfuserEx cannot be decompiled any more.

License

This article, along with any associated source code and files, is licensed under The Microsoft Public License (Ms-PL)


Written By
Architect Thomson Reuters
India India
This member has not yet provided a Biography. Assume it's interesting and varied, and probably something to do with programming.

Comments and Discussions

 
QuestionVirus Pin
bir yaz27-May-21 18:00
bir yaz27-May-21 18:00 
AnswerRe: Virus Pin
Arun Endapally9-Jun-21 21:28
professionalArun Endapally9-Jun-21 21:28 
GeneralMy vote of 5 Pin
Tech Code Freak4-Apr-21 3:05
Tech Code Freak4-Apr-21 3:05 
Questionnot working for me showing error Pin
neeraj_23-Feb-21 20:21
neeraj_23-Feb-21 20:21 
QuestionMessage Closed Pin
23-Feb-21 19:59
neeraj_23-Feb-21 19:59 
Questionwhat about new .net core publish options; dotPaek not able to decompile don't check other simple options Pin
maxoptimus3-Oct-20 8:43
maxoptimus3-Oct-20 8:43 
QuestionSupport Pin
Member 149256482-Sep-20 12:36
Member 149256482-Sep-20 12:36 
QuestionThis is a dangerous Virus! don't use ConfuserEx.exe Pin
Ahmed Risa26-Aug-20 19:24
Ahmed Risa26-Aug-20 19:24 
QuestiondotPeek can still decompile the exe Pin
rehmaknatiq18-Jun-20 2:30
rehmaknatiq18-Jun-20 2:30 
AnswerRe: dotPeek can still decompile the exe Pin
khaliljkazi@gmail.com15-Jul-20 17:57
khaliljkazi@gmail.com15-Jul-20 17:57 
GeneralRe: dotPeek can still decompile the exe Pin
Member 1478481231-Jul-20 6:35
Member 1478481231-Jul-20 6:35 
AnswerRe: dotPeek can still decompile the exe Pin
vishal_h22-Sep-20 2:06
vishal_h22-Sep-20 2:06 
PraiseThank you! Pin
Anderson A D Nunes30-Apr-20 20:47
Anderson A D Nunes30-Apr-20 20:47 
GeneralMy vote of 5 Pin
Jared Drake18-Feb-20 2:55
Jared Drake18-Feb-20 2:55 
PraisePerfect article! Pin
Jared Drake18-Feb-20 3:18
Jared Drake18-Feb-20 3:18 
GeneralMy vote of 5 Pin
whitesoul0110-Oct-19 5:53
whitesoul0110-Oct-19 5:53 
QuestionThanks Pin
AliBayat.200824-Aug-19 18:03
AliBayat.200824-Aug-19 18:03 
QuestionNot worked with WPF application Pin
Shailesh vora30-Jul-19 20:48
Shailesh vora30-Jul-19 20:48 
Questionprotect in memory after obfuscation Pin
gianmarcocastagna_22-Mar-18 5:05
gianmarcocastagna_22-Mar-18 5:05 
BugConfuserX - Unpacker Pin
Soran Sobhani Rad20-Feb-18 21:53
professionalSoran Sobhani Rad20-Feb-18 21:53 
GeneralProtect compact framework EXE File Pin
Member 21243567-May-17 20:43
Member 21243567-May-17 20:43 
GeneralRe: Protect compact framework EXE File Pin
Arun Endapally30-May-17 8:24
professionalArun Endapally30-May-17 8:24 
GeneralMy vote of 5 Pin
Аslam Iqbal6-Nov-16 17:59
professionalАslam Iqbal6-Nov-16 17:59 
SuggestionChange the title to reflect you are talking about .Net assemblies only Pin
the Kris5-Nov-16 0:26
the Kris5-Nov-16 0:26 
Quote:
PE file contains MSIL (Microsoft Intermediate Language) and Metadata.

Well, only in case of .Net assemblies, not in the case of native exe's and dll's.
GeneralRe: Change the title to reflect you are talking about .Net assemblies only Pin
Arun Endapally5-Nov-16 20:35
professionalArun Endapally5-Nov-16 20:35 

General General    News News    Suggestion Suggestion    Question Question    Bug Bug    Answer Answer    Joke Joke    Praise Praise    Rant Rant    Admin Admin   

Use Ctrl+Left/Right to switch messages, Ctrl+Up/Down to switch threads, Ctrl+Shift+Left/Right to switch pages.