.NET Framework Security
by Brian A. LaMacchia, Sebastian Lange, Matthew Lyons, Rudi Martin, Kevin T. Price
Summary
This chapter introduced the various verification and validation checks presupposed by Code Access Security. All assemblies ship in the PE/COFF file format—the CLR implements a number of checks preventing security exploits through the corruption of the file.
Assemblies also carry metadata that describes the type structure and has information about the identity of an assembly. Metadata is used throughout the CLR infrastructure to successfully execute assemblies. Therefore, the CLR also implements a number of metadata checks that prevent security holes through metadata corruption.
Compilers targeting the .NET Framework translate programming language source code into an object-oriented assembly language called IL.
The CLR tests whether the ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access