/

Server-side ASP.NET Protection

Shield provides robust protection for ASP.NET server-side applications, securing your .NET assemblies and business logic against reverse engineering and tampering.


For ASP.NET server-side applications, we recommend the following protections for the best balance of security and compatibility:

ProtectionRecommendationNotes
Renamer✓ EssentialUse rename_public: false to maintain API surface
Control Flow✓ RecommendedSecures critical business logic
Virtualization✓ RecommendedFor highly sensitive code
Anti-Debug✓ RecommendedPrevents unauthorized debugging
Constants Encryption✓ RecommendedSecures sensitive values and strings
Constants Mutation✓ RecommendedAdds additional security to constant values

Best Practices

  1. Protect all critical assemblies: Apply Shield to every DLL/EXE containing business logic
  2. Set rename_public: false: To avoid breaking public APIs and routing
  3. Test thoroughly: Validate your application after protection, especially for reflection-heavy code
  4. Use selective protection: Apply advanced protections only to sensitive code
  5. Monitor performance: Most protections have minimal impact, but always test

Shield automatically adapts its protections to ASP.NET server-side environments. No special configuration is needed for standard scenarios.


Compatibility

Shield supports all modern ASP.NET Framework and ASP.NET Core versions. Protected assemblies are compatible with:

  • Windows and Linux deployments
  • Azure App Service, AWS, and other cloud providers
  • All major .NET runtimes (including .NET 6/7/8)

Shield automatically adapts protections to your project type and deployment environment.

For client-side protection, see JavaScript Protection.

Previous
Known Limitations