Skip to Content
.NET Framework Security
book

.NET Framework Security

by Brian A. LaMacchia, Sebastian Lange, Matthew Lyons, Rudi Martin, Kevin T. Price
April 2002
Intermediate to advanced
816 pages
20h 56m
English
Addison-Wesley Professional
Content preview from .NET Framework Security

Code Access Security's Dependence on Validation and Verification

Now that each of the different validation and verification technology parts of the CLR has been introduced, it is time to take a step back and review how all these checks tie back into Code Access Security. It turns out that there is a clear line of dependency between the different types of checks.

Metadata checks rely on the presence of a noncorrupted PE file. Corrupted PE files can run malicious native code before metadata checks could even begin. Therefore, there is a strong dependency between PE file format validity checks and Metadata checks. IL verification, in turn, relies both on valid IL to be present and on correct metadata. Finally, Code Access Security only works if ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Programming .NET Security

Programming .NET Security

Adam Freeman, Allen Jones
Pro C# 7: With .NET and .NET Core

Pro C# 7: With .NET and .NET Core

Andrew Troelsen, Philip Japikse
.Net Framework Essentials

.Net Framework Essentials

Thuan L. Thai, Hoang Lam

Publisher Resources

ISBN: 067232184XPurchase book