As the Skaters output, the transformed fragments are re-assembled and obfuscated with the designated obfuscation criteria.
Control Flow obfuscation discourages reverse engineering and malicious tampering of software codes by applying false conditional statements and other misleading constructs in order to confuse and break decompilers. Given the original source codes and desired obfuscation criteria, the proposed Control Flow obfuscation works by decomposing the source codes into fragments and then applying various transforms to the code fragments. Moreover, since only Control Flows are obfuscated with a sequence of transformations that produce equivalent results of the original fragments, the final output can still preserve the same execution results as the original codes.
You can easily debug obfuscated .NET applications with Skater Visual Studio .NET integration module. It is possible to debug an application even if some parts of its code are obfuscated and others not. This module integrates with Microsoft Visual Studio IDE and allows you to debug obfuscated software step by step without deobfuscating it first. Skater .NET Obfuscator provides the feature of exclusion for your obfuscate code. You can configure the settings for the assembly that you want to exclude from obfuscation process.