The unique characteristics of managed code that make reverse
engineering and tampering almost trivial are well understood
and are, in fact, a common best practice among the legitimate
development community. As with all powerful technologies,
reverse engineering and application modification can be used
productively and also for mischief. A portfolio of technologies
has emerged and matured over the past decade and is in
use across industries. As with any risk-based strategy, there
is no “one size fits all” approach. However, what may prove
difficult to defend should an incident arise is no policy at all.