Summary

This chapter introduced the various verification and validation checks presupposed by Code Access Security. All assemblies ship in the PE/COFF file format—the CLR implements a number of checks preventing security exploits through the corruption of the file.

Assemblies also carry metadata that describes the type structure and has information about the identity of an assembly. Metadata is used throughout the CLR infrastructure to successfully execute assemblies. Therefore, the CLR also implements a number of metadata checks that prevent security holes through metadata corruption.

Compilers targeting the .NET Framework translate programming language source code into an object-oriented assembly language called IL.

The CLR tests whether the ...

Get .NET Framework Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.