Code Virtualizer is a powerful code-obfuscation system that helps developers protect their sensitive code areas against Reverse Engineering while requiring minimum system resources. Code Virtualizer will convert your original code (Intel x86 instructions) into Virtual Opcodes that will only be understood by an internal Virtual Machine. Those Virtual Opcodes and the Virtual Machine itself are unique for every protected application avoiding a general attack over Code Virtualizer. Code Virtualizer can protect your sensitive code areas in any x32 and x64 native PE files (like executable filesEXEs system services DLLs OCXs ActiveX controls screen savers and device drivers). Code virtualization consists of the transformation of binary code from a specific machine into a different binary code that is understood by another machine. That is the instruction set from a specific machine is converted into a new instruction set which is understood by a different machine. Code Virtualizer can generate multiple types of virtual machines with a different instruction set for each one. This means that a specific block of Intel x86 instructions can be converted into different instruction set for each machine preventing an attacker from recognizing any generated virtual opcode after the transformation from x86 instructions. When an attacker tries to decompile a block of code that was protected by Code Virtualizer he will not find the original x86 instructions. Instead he will find a completely new instruction set which is not recognized by him or any other special decompiler. This will force the attacker to go through the extremely hard work of identifying how each opcode is executed and how the specific virtual machine works for each protected application. Code Virtualizer totally obfuscates the execution of the virtual opcodes and the study of each unique virtual machine in order to prevent someone from studying how the virtual opcodes are executed.