Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Unity3D code encryption prevents decompilation and resource encryption

2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Unity3D project encryption prevents decompilation by using the Virbox LM encryption scheme. Virbox LM has a perfect solution to protect the code and resources in the Unity3D game project, which can effectively prevent the code from being decompiled and the resource files stolen. It can encrypt assembly-scharp.dll directly and encrypt mono files automatically. The .assets resource file can be effectively encrypted and protected.

Encryption effect:

Code anti-decompilation, driver-level anti-debugging, resource anti-theft!

Code encryption to prevent decompilation

Virbox Protector shelling tool

The software developed by Unity3D can be protected by shell tools, and the main protection methods are fragmented code, confusion and virtualization. Suitable for fast encryption scheme, do not need to write any code, through the setting tool to provide options to complete the software shell protection, convenient and fast.

Protection principle: fragment code protection, using mature code extraction technology, extract a large amount of code from the software, and execute it in a secure environment after encryption and confusion. Fragment code execution can be simply understood as breaking up software functions and executing them in a secure environment, making it impossible for crackers to start, which is a major breakthrough in the concept of software protection.

Anti-debugging at driver level, killing common debuggers in the market in seconds

Anti-triad engine

Traditional encryption lock manufacturers only provide basic passive protection functions, and developers need to pay a lot of extra work if they want to obtain higher security intensity.

Think deeply and take the initiative to introduce the anti-black engine into the encryption system. Deep thinking Digital Shield extends the idea of software protection from API or shell passive anti-debugging and confusion to a comprehensive and in-depth active / passive combination.

Features and functions of Anti-Triad engine (AHS):

Advanced process protection

Kernel state anti-debugging, anti-injection, anti-hook: common debugging tools in the market fail to operate on this process, such as Ollydbg, Windbg, CheatEngine and so on.

Provide secure Windows system API: perfectly hide the system API call process, avoid hooks, tracking, analysis.

Process module killing based on blacklist feature library

Intercept known inverse tools: such as OllyDbg, Windbg, CheatEngine, IDA.

Block known cracked patches: pirated software with file patches and memory patches cannot run.

Intercept software that infringes intellectual property rights: after some components of the original IP manufacturer are stolen, they cannot be grafted and used.

Intercept theft behavior: intercept known theft module

L memory protection

Process data read protection: the memory in the process cannot be read by other process modules. Such as: account password information, key, transaction information, bank card information and other sensitive information.

Process data write protection: prevent out-of-process modification of protected process data. Such as game equipment data, authorization information and so on.

L suspicious process module upload

Upload the suspicious module to the background for further analysis and processing, providing strong support for anti-triad strategy, anti-piracy patch and legal forensics.

Protect resources against theft and protect game resource files

To prevent pictures, audio and video and other resources from being copied, you can use DS protector in the Virbox tool, which is specially developed for resource protection.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report