SlideShare a Scribd company logo
Software potential code protector
Protect your Code and Intellectual Property
Protect your single most important
investment – your Microsoft® .NET

You can choose to ignore the problem – though this is

code.

code protection you really need to look at a solution that
has been built from the ground up for the.Net environment

Your company’s software and the source code behind it are
at risk—and you may not even be aware of the extent of
that risk. Reverse engineering of Microsoft® .NET
applications exposes trade secrets, compromises core
intellectual property and facilitates piracy.

unlikely to satisfy savvy investors or customers. You can use
basic tools such as obfuscators, but for the ultimate in .NET

and provides the strongest protection available in the
market today.
Now you can protect your software from theft, casual
piracy, reverse engineering, tampering & misuse with the
strongest .NET code protection available. Using a patented
code transformation technology that goes beyond

“In 2009, more than four out of 10 software
programs installed on personal computers
around the world were stolen, with a commercial
value of more than $51 billion. Unauthorized
software can manifest itself in otherwise legal
businesses that buy too few software licenses, or
overt criminal enterprises that sell counterfeit
copies of software programs at cut-rate prices,
online or offline” – source BSA/IDC 2010.”

Over half of the world’s personal computer users - 57% admit to pirating software. Thirty one per cent say they do
it “all the time”, “most of the time”, or “occasionally” and

traditional obfuscation & encryption techniques, The
Software Potential Code Protector from InishTech removes
the need for hardware keys, while increased code integrity
can also protect against viruses and malware.

Protecting .NET Applications
Software publishers using Microsoft’s .NET framework have
benefited from faster development; reduced deployment
issues; and a consistent platform across desktop, Web, and
mobile applications; as well as support for a range of
programming languages such as C#, VB and F#.

another 26 per cent admit to having stolen software but
only “rarely”. These are among the findings of a survey of
nearly 15,000 computer users across 33 countries
conducted as part of the ninth annual BSA Global Software
Piracy Study.
A major source of this unauthorised software is a result of
the reverse engineering of applications which facilitates
illegal copying and cloning and compromises intellectual
property.

The .NET challenge
No code is unbreakable, but Microsoft® .NET IL is
particularly susceptible to reverse engineering. Protection
of your code and IP is of vital interest to you as a company,
to your investors and to your customers who want to
ensure they are using a legitimate product and can remain
compliant.
Hackers and pirates are sophisticated in their attacks, and
they are constantly looking for new ways to crack valuable
intellectual property. Applications built on the Microsoft®
.NET Framework run a particular risk of reverse engineering.

However, the power of this consistent platform comes at a
cost when it comes to reverse engineering. As opposed to
traditional, ‘native’ development where high-level
languages compile down to machine code, which executes
against the CPU, .NET languages compile down to the
Microsoft Intermediate Language (MSIL). Contained within
the MSIL is all of the information necessary to convert it
back into a high-level language, like C# or Microsoft®
Visual Basic® .NET. The .NET Framework also introduced
Beyond Simple Obfuscation
reflection, which can be used to examine any .NET-based
code, whether it is a single class or an entire assembly.
There are many reflection-based tools available that utilise
this meta-data to decompile a .NET assembly and show you
just about all of its secrets. With these tools one can browse
the classes and methods of an assembly, examine the MSIL
generated by these classes and methods, and decompile
the classes and methods to see the equivalent in C#, Visual
Basic® .NET or F#.

Original Source

Without adequate protection, hackers can read, copy, and,
even modify the compiled .NET code. When your
application is ready to go to market or deploy into the
enterprise, you need a reliable, full-featured, and
convenient way to help secure your software.

Code Transformation
Software Potential’s unique approach to Microsoft® .NET
code protection is based on a one way, random
transformation of an assembly’s MSIL–which is easy to
reverse engineer–into a unique Secure Execution
Environment Language (SEEL)–which is not. Each transform
is unique and the resultant SEEL can only be extracted and

Output of Reflector Tool
This selective, one-way code transformation mechanism

processed by a corresponding Secure Execution

provides a greater level of protection for highly sensitive
intellectual property. Because transformed code is

Environment (SEE), enabling the transformed code to run
within the native .NET Framework at runtime. The

practically unreadable, there is minimal risk of in-memory
code compromise on client machines.

protected execution environment is compiled into the
application binaries, making it a permanent and integral
part of the application.

Why Software Potential Code
Protector?

Each transformation of MSIL into a unique SEEL is governed
by a Permutation package, containing the random MSIL to
SEEL mapping and the corresponding SEE.
Each Permutation is unique and one can elect to generate
multiple permutations, to ensure each product is uniquely
protected. It is even possible to regenerate the permutation
per release to ensure each assembly is uniquely
transformed.

Software Potential .NET Code Protector is the most secure
way for you to protect your valuable code. Code Protector
provides:


The strongest solution for .NET code protection
using our unique, patented transformation and SVM
methodology



The ability to protect individual applications and
even individual application releases or customer
versions with unique permutations

The developer uses the Software Potential Code Protector
application, loaded with the required Permutation package,
to both uniquely transform selected methods within target



assemblies and generate the required runtime components.
Code Protector can be integrated with the build
environment to automate the code transformation process

A seamless integration with the MS Build
environment



Simple one click protection in minutes



Proven return on Investment – Code Protector is a

on build configuration basis.

low cost solution that is easy to implement which
will provide an immediate return on your investment
Three simple steps

 Load Code Protector NuGet package into Visual Studio
 Select methods to be protected by adding [Protect]
attribute
 Build assemblies as normal to get protected code in the
project output

About InishTech
InishTech is an innovative cloud technology company specializing
in software monetization services for ISVs building software in the
.NET ecosystem. InishTech was spun out of Microsoft in 2009 and
is now privately held with headquarters in Dublin, Ireland.
Microsoft remain a significant minority shareholder.
Inishtech’s patented SOFTWARE POTENTIAL technology allows
software publishers to protect their most valuable asset – their IP
– with the industry’s most advanced code protection and also
provides them with a sophisticated Software Licensing
Management platform as a service that gives them total control
over the monetization of their products in the marketplace –
allowing for complete license enforcement, usage compliance,
entitlement management, and easy product configuration /
packaging. InishTech is now well established as the licensing &
code protection partner for hundreds of the world’s most
successful .NET software vendors and is a key Microsoft partner in
the field of licensing & code protection.

NovaUCD, Belfield Innovation Park, University
College Dublin, Belfield, Dublin 4, Ireland
Phone:

+(353) 1 7163635

Email:

info@inishtech.com

Web:

www.inishtech.com

More Related Content

PPTX
ESET is introducing its brand new product ESET Secure Authentication
PDF
The new era of mega trends securtity
PDF
Implementing Trusted Endpoints in the Mobile World
PDF
Moxa white paper---Using Sample Code to Develop Embedded Applications
PDF
How Intel Security Ensures Identity Protection - Infographic
PDF
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
PDF
Lowered uncertainty of an anti-theft product to secure mobile end points, for...
PDF
Cloud computing security infrastructure
ESET is introducing its brand new product ESET Secure Authentication
The new era of mega trends securtity
Implementing Trusted Endpoints in the Mobile World
Moxa white paper---Using Sample Code to Develop Embedded Applications
How Intel Security Ensures Identity Protection - Infographic
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Lowered uncertainty of an anti-theft product to secure mobile end points, for...
Cloud computing security infrastructure

What's hot (20)

PDF
SecurePass at OpenBrighton
PDF
iXGuard
PPTX
Flak general v2 5
PDF
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
PDF
Comodo advanced endpoint protection
PPTX
Signature Presentation(10062011) Vc 3 Full
PPTX
ESET: #DoMore With Our Comprehensive Range of Business Products
PPTX
IoT Product development Meetup
PDF
A taxonomy of obfuscating transformations
PDF
Moving Beyond Zero Trust
PDF
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
PDF
Android Security Maximized by Samsung KNOX
PPTX
Blockchain Defined Perimeter for Cloud Security
PPTX
Kaspersky endpoint security business presentation
PDF
Cyber Threat Intelligence: Highlights and Trends for 2020
PDF
Security Lock Down Your Computer Like the National Security Agency (NSA)
PPTX
Kaspersky
PDF
SecuSUITE for Enterprise Brochure
PDF
[Fortifier] Reliable Software Engineering (Daria)
PPT
Apani Ov V9
SecurePass at OpenBrighton
iXGuard
Flak general v2 5
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Comodo advanced endpoint protection
Signature Presentation(10062011) Vc 3 Full
ESET: #DoMore With Our Comprehensive Range of Business Products
IoT Product development Meetup
A taxonomy of obfuscating transformations
Moving Beyond Zero Trust
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
Android Security Maximized by Samsung KNOX
Blockchain Defined Perimeter for Cloud Security
Kaspersky endpoint security business presentation
Cyber Threat Intelligence: Highlights and Trends for 2020
Security Lock Down Your Computer Like the National Security Agency (NSA)
Kaspersky
SecuSUITE for Enterprise Brochure
[Fortifier] Reliable Software Engineering (Daria)
Apani Ov V9
Ad

Viewers also liked (18)

PDF
Scottish diaspora working paper
PDF
Teach a Poem To a Friend
PDF
El ecuador
PPTX
Agency analysis [autosaved]
PDF
Software Licensing for SaaS Applications
PDF
Blowing in the wind presentation
DOCX
Proyecto final para empastar
DOCX
Entrevista
PDF
Software Monetization for the Software Business
PPTX
Dar consulting final
PDF
Introduction to Software Potential
DOCX
Planeacion de la orquesta
DOCX
Rubrica lenguaje oral
PDF
Fp in scala part 1
PDF
Fp in scala with adts part 2
PDF
Fp in scala with adts
PDF
ISVs & the Commercial Transition to the Cloud
PDF
Fp in scala part 2
Scottish diaspora working paper
Teach a Poem To a Friend
El ecuador
Agency analysis [autosaved]
Software Licensing for SaaS Applications
Blowing in the wind presentation
Proyecto final para empastar
Entrevista
Software Monetization for the Software Business
Dar consulting final
Introduction to Software Potential
Planeacion de la orquesta
Rubrica lenguaje oral
Fp in scala part 1
Fp in scala with adts part 2
Fp in scala with adts
ISVs & the Commercial Transition to the Cloud
Fp in scala part 2
Ad

Similar to Software potential code protector (20)

PDF
Addressing New Challenges in Software Protection for .NET
PDF
Protecting and Licensing .NET Applications
PDF
Software monetization for the software business
PDF
How to protect your .net software code with ILProtector
PPS
Reverse Engineering v/s Secure Coding
PPS
Atul - Reverse Engineering v/s Secure Coding - ClubHack2008
PDF
linkedin brainies
PPTX
Tech Ed09 Net Best Practices Bijoy New
PDF
V4I5201571
PDF
Full Download Programming NET Security 1st Edition Adam Freeman PDF DOCX
PDF
Dotnet interview qa
PDF
Introduction to Software Potential
PPTX
Reverse Engineering.pptx
PPT
Making the case for sandbox v1.1 (SD Conference 2007)
DOCX
The Seven Pillars Of Asp.Net
DOCX
The seven pillars of aspnet
PDF
.NET MALWARE THREAT: INTERNALS AND REVERSING DEF CON USA 2019
DOCX
Online lg prodect
PPTX
.Net platform an understanding
DOC
.Net framework interview questions
Addressing New Challenges in Software Protection for .NET
Protecting and Licensing .NET Applications
Software monetization for the software business
How to protect your .net software code with ILProtector
Reverse Engineering v/s Secure Coding
Atul - Reverse Engineering v/s Secure Coding - ClubHack2008
linkedin brainies
Tech Ed09 Net Best Practices Bijoy New
V4I5201571
Full Download Programming NET Security 1st Edition Adam Freeman PDF DOCX
Dotnet interview qa
Introduction to Software Potential
Reverse Engineering.pptx
Making the case for sandbox v1.1 (SD Conference 2007)
The Seven Pillars Of Asp.Net
The seven pillars of aspnet
.NET MALWARE THREAT: INTERNALS AND REVERSING DEF CON USA 2019
Online lg prodect
.Net platform an understanding
.Net framework interview questions

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPT
Teaching material agriculture food technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Encapsulation theory and applications.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Approach and Philosophy of On baking technology
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
sap open course for s4hana steps from ECC to s4
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
KodekX | Application Modernization Development
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Per capita expenditure prediction using model stacking based on satellite ima...
MIND Revenue Release Quarter 2 2025 Press Release
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Understanding_Digital_Forensics_Presentation.pptx
Teaching material agriculture food technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Spectral efficient network and resource selection model in 5G networks
Encapsulation theory and applications.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Approach and Philosophy of On baking technology
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
The AUB Centre for AI in Media Proposal.docx
sap open course for s4hana steps from ECC to s4
“AI and Expert System Decision Support & Business Intelligence Systems”
Dropbox Q2 2025 Financial Results & Investor Presentation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
KodekX | Application Modernization Development
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

Software potential code protector

  • 2. Protect your Code and Intellectual Property Protect your single most important investment – your Microsoft® .NET You can choose to ignore the problem – though this is code. code protection you really need to look at a solution that has been built from the ground up for the.Net environment Your company’s software and the source code behind it are at risk—and you may not even be aware of the extent of that risk. Reverse engineering of Microsoft® .NET applications exposes trade secrets, compromises core intellectual property and facilitates piracy. unlikely to satisfy savvy investors or customers. You can use basic tools such as obfuscators, but for the ultimate in .NET and provides the strongest protection available in the market today. Now you can protect your software from theft, casual piracy, reverse engineering, tampering & misuse with the strongest .NET code protection available. Using a patented code transformation technology that goes beyond “In 2009, more than four out of 10 software programs installed on personal computers around the world were stolen, with a commercial value of more than $51 billion. Unauthorized software can manifest itself in otherwise legal businesses that buy too few software licenses, or overt criminal enterprises that sell counterfeit copies of software programs at cut-rate prices, online or offline” – source BSA/IDC 2010.” Over half of the world’s personal computer users - 57% admit to pirating software. Thirty one per cent say they do it “all the time”, “most of the time”, or “occasionally” and traditional obfuscation & encryption techniques, The Software Potential Code Protector from InishTech removes the need for hardware keys, while increased code integrity can also protect against viruses and malware. Protecting .NET Applications Software publishers using Microsoft’s .NET framework have benefited from faster development; reduced deployment issues; and a consistent platform across desktop, Web, and mobile applications; as well as support for a range of programming languages such as C#, VB and F#. another 26 per cent admit to having stolen software but only “rarely”. These are among the findings of a survey of nearly 15,000 computer users across 33 countries conducted as part of the ninth annual BSA Global Software Piracy Study. A major source of this unauthorised software is a result of the reverse engineering of applications which facilitates illegal copying and cloning and compromises intellectual property. The .NET challenge No code is unbreakable, but Microsoft® .NET IL is particularly susceptible to reverse engineering. Protection of your code and IP is of vital interest to you as a company, to your investors and to your customers who want to ensure they are using a legitimate product and can remain compliant. Hackers and pirates are sophisticated in their attacks, and they are constantly looking for new ways to crack valuable intellectual property. Applications built on the Microsoft® .NET Framework run a particular risk of reverse engineering. However, the power of this consistent platform comes at a cost when it comes to reverse engineering. As opposed to traditional, ‘native’ development where high-level languages compile down to machine code, which executes against the CPU, .NET languages compile down to the Microsoft Intermediate Language (MSIL). Contained within the MSIL is all of the information necessary to convert it back into a high-level language, like C# or Microsoft® Visual Basic® .NET. The .NET Framework also introduced
  • 3. Beyond Simple Obfuscation reflection, which can be used to examine any .NET-based code, whether it is a single class or an entire assembly. There are many reflection-based tools available that utilise this meta-data to decompile a .NET assembly and show you just about all of its secrets. With these tools one can browse the classes and methods of an assembly, examine the MSIL generated by these classes and methods, and decompile the classes and methods to see the equivalent in C#, Visual Basic® .NET or F#. Original Source Without adequate protection, hackers can read, copy, and, even modify the compiled .NET code. When your application is ready to go to market or deploy into the enterprise, you need a reliable, full-featured, and convenient way to help secure your software. Code Transformation Software Potential’s unique approach to Microsoft® .NET code protection is based on a one way, random transformation of an assembly’s MSIL–which is easy to reverse engineer–into a unique Secure Execution Environment Language (SEEL)–which is not. Each transform is unique and the resultant SEEL can only be extracted and Output of Reflector Tool This selective, one-way code transformation mechanism processed by a corresponding Secure Execution provides a greater level of protection for highly sensitive intellectual property. Because transformed code is Environment (SEE), enabling the transformed code to run within the native .NET Framework at runtime. The practically unreadable, there is minimal risk of in-memory code compromise on client machines. protected execution environment is compiled into the application binaries, making it a permanent and integral part of the application. Why Software Potential Code Protector? Each transformation of MSIL into a unique SEEL is governed by a Permutation package, containing the random MSIL to SEEL mapping and the corresponding SEE. Each Permutation is unique and one can elect to generate multiple permutations, to ensure each product is uniquely protected. It is even possible to regenerate the permutation per release to ensure each assembly is uniquely transformed. Software Potential .NET Code Protector is the most secure way for you to protect your valuable code. Code Protector provides:  The strongest solution for .NET code protection using our unique, patented transformation and SVM methodology  The ability to protect individual applications and even individual application releases or customer versions with unique permutations The developer uses the Software Potential Code Protector application, loaded with the required Permutation package, to both uniquely transform selected methods within target  assemblies and generate the required runtime components. Code Protector can be integrated with the build environment to automate the code transformation process A seamless integration with the MS Build environment  Simple one click protection in minutes  Proven return on Investment – Code Protector is a on build configuration basis. low cost solution that is easy to implement which will provide an immediate return on your investment
  • 4. Three simple steps  Load Code Protector NuGet package into Visual Studio  Select methods to be protected by adding [Protect] attribute  Build assemblies as normal to get protected code in the project output About InishTech InishTech is an innovative cloud technology company specializing in software monetization services for ISVs building software in the .NET ecosystem. InishTech was spun out of Microsoft in 2009 and is now privately held with headquarters in Dublin, Ireland. Microsoft remain a significant minority shareholder. Inishtech’s patented SOFTWARE POTENTIAL technology allows software publishers to protect their most valuable asset – their IP – with the industry’s most advanced code protection and also provides them with a sophisticated Software Licensing Management platform as a service that gives them total control over the monetization of their products in the marketplace – allowing for complete license enforcement, usage compliance, entitlement management, and easy product configuration / packaging. InishTech is now well established as the licensing & code protection partner for hundreds of the world’s most successful .NET software vendors and is a key Microsoft partner in the field of licensing & code protection. NovaUCD, Belfield Innovation Park, University College Dublin, Belfield, Dublin 4, Ireland Phone: +(353) 1 7163635 Email: info@inishtech.com Web: www.inishtech.com