Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Unity3D Project encryption-Elite 5 encryption Lock solution

2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Unity3D project encryption

With the completion of the development of the Unity3D project, developers need to encrypt the code and resources before release to prevent the code from being decompiled, prevent resources from being stolen and cause unnecessary losses. If there is no encryption, there may soon be a bunch of cracked games.

Unity3D encryption scheme encryption principle:

Unity3D uses open source mono C # syntax, all code is not compiled to EXE, but is located at {APP}\ build\ game_Data\ Managed\ Assembly-CSharp.dll (not for the latest Unity3D 2017), and mono syntax is only compatible with C #, but the principle is completely different, traditional C # shells all fail, because Assembly-CSharp.dll is not a standard DLL loading process, neither PE DLL nor dotNet DLL loading Instead, the mono.dll reads the Assembly-CSharp.dll 's C # script for interpretation and execution. You don't have to wait for the official IL2CPP and your own custom mono engine!

Virbox Protector shelling tool

The software developed by Unity3D can be protected by shell tools without writing any code. It is convenient and fast to provide options by setting tools to complete software shell protection.

Protection principle: fragment code protection, using mature code extraction technology, extract a large amount of code from the software, and execute it in a secure environment after encryption and confusion. Fragment code execution can be simply understood as breaking up software functions and executing them in a secure environment, making it impossible for crackers to start, which is a major breakthrough in the concept of software protection.

DS Protector resource protection

Protect all kinds of resource files, such as pictures, video, audio, etc., to protect resources from being stolen.

Encryption security effect

1 prevent decompilation

2 driver level anti-debugging, killing all debuggers on the market (dnspy, WinDbg/OllyDbg/X64Dbg)

3 prevent pictures, audio and video and other resources from being copied

4 prevent memory from being dump

5 does not reduce the number of game frames, high computation makes some functions can increase the number of game frames

Project release plan

After encrypting the code and resources through the Virbox Protector shell tool and the DS Protector tool, and using the Elite 5 hardware encryption lock, you must use the encryption lock to use the software. Support for code migration, but also an upgraded version of fragmented code execution technology.

What can Elite 5 encryption Lock do?

1 protect the security of the software from being pirated

2 support the time-limited sale of software

3 support the sale of software limited function modules

4 to master the actual use of the software users

5 Software updates can be upgraded remotely

The Elite 5 Elf encryption Lock weighs only 3.6 grams and has an exquisite body equipped with the same powerful hardware performance as the Elite 5 Standard Edition. The storage space can be up to 512K and up to 6000 software licenses can be stored. International imported 32-bit smart card chip, ARM SC300 processor, security level CC EAL 5 +; execution speed 50 MIPS, communication speed up to 300K Sport USB 2.0 full-speed device; sector erasable times up to 1650 million times.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report