/

Tampering Detection

Protection Module: TamperingDetection

Detects modifications to your application's code, resources, or assemblies.

Available for:

  • Desktop Applications
  • Mobile Applications
  • All .NET platforms

How It Works

Tampering Detection validates application integrity by checking for unauthorized modifications to assemblies, resources, and critical files.

Detection Methods:

  • Assembly Hash Validation - Compares runtime assembly hashes vs embedded signatures
  • Resource Integrity - Validates embedded resources haven't been modified
  • Strong Name Verification - Checks assembly signatures
  • File Timestamp Analysis - Detects file replacement
  • Code Section Validation - Verifies IL code integrity

Common Tampering Scenarios:

  • IL code patching (cracks, keygens)
  • Resource replacement (assets, configs)
  • Assembly modification (removing protections)
  • DLL replacement attacks

Configuration

JSON
{
  "protections": {
    "TamperingDetection": {
      "enabled": true,
      "action": "close"
    }
  }
}

Available Actions

ActionBehavior
CloseTerminate immediately (recommended)
LogRecord tampering attempt
CustomExecute custom handler

Platform Compatibility

PlatformSupport
.NET 6+
.NET Framework
MAUI
Xamarin

Actions

Configure responses

Previous
Memory Dump Detection