Code Access Security's Dependence on Validation and Verification

Now that each of the different validation and verification technology parts of the CLR has been introduced, it is time to take a step back and review how all these checks tie back into Code Access Security. It turns out that there is a clear line of dependency between the different types of checks.

Metadata checks rely on the presence of a noncorrupted PE file. Corrupted PE files can run malicious native code before metadata checks could even begin. Therefore, there is a strong dependency between PE file format validity checks and Metadata checks. IL verification, in turn, relies both on valid IL to be present and on correct metadata. Finally, Code Access Security only works if ...

Get .NET Framework Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.