Tampering Detection
Protection Module: TamperingDetection
Detects modifications to your application's code, resources, or assemblies.
Available for:
- Desktop Applications
- Mobile Applications
- All .NET platforms
How It Works
Tampering Detection validates application integrity by checking for unauthorized modifications to assemblies, resources, and critical files.
Detection Methods:
- Assembly Hash Validation - Compares runtime assembly hashes vs embedded signatures
- Resource Integrity - Validates embedded resources haven't been modified
- Strong Name Verification - Checks assembly signatures
- File Timestamp Analysis - Detects file replacement
- Code Section Validation - Verifies IL code integrity
Common Tampering Scenarios:
- IL code patching (cracks, keygens)
- Resource replacement (assets, configs)
- Assembly modification (removing protections)
- DLL replacement attacks
Configuration
JSON
{
"protections": {
"TamperingDetection": {
"enabled": true,
"action": "close"
}
}
}{
"protections": {
"TamperingDetection": {
"enabled": true,
"action": "close"
}
}
}Available Actions
| Action | Behavior |
|---|---|
| Close | Terminate immediately (recommended) |
| Log | Record tampering attempt |
| Custom | Execute custom handler |
Platform Compatibility
| Platform | Support |
|---|---|
| .NET 6+ | ✔ |
| .NET Framework | ✔ |
| MAUI | ✔ |
| Xamarin | ✔ |
Related Protections
Actions
Configure responses