SlideShare a Scribd company logo
1 of 15
CLR 4
Why Implement CAS?



                             Web App running with full trust



    File Upload




            Malicious Code
File Dialog


Environment
                            Printing
 Variables



              Assembly
Internet        Local Intranet    Nothing

• File Dialog      • Environment
• Isolated           Variables
  Storage File     • File Dialog
• Security         • Isolated
• User Interface     Storage File
• Printing         • Reflection
                   • Security
                   • User Interface
                   • DNS
                   • Printing
Assembly

Application   Publisher                              Strong
                          URL   Site   Zone   Hash
 Directory                                           Name
Permission   Membership
                          Code Group
   Set        Condition
Code Group A Membership
                           Conditions



Assembly Evidence       Code Group B
                     Membership Conditions



                        Code Group C
                     Membership Conditions
Assembly A   X Assembly A                  X .NET 2.0

.NET 1.1




                             X Assembly A
Permissions Check
App Domain Permissions – Full Trust


Main

Foo

             App Domain Permissions - Internet




                     Bar

                 File Read
-Heterogeneous App domain not possible now
        - Assemblies with lower trust level could upgrade
        themselves to a higher trust level by calling partially trusted
        assemblies
-App domains previously had to be loaded after CAS was in place.
 Static
       Analysis Possible
 Sandboxing Easier
 No permission set overlap due to heterogeneous
  app domains
 Permission grant sets not machine dependent
 Assembly with a lower trust level can not call an
  assembly with higher trust level and upgrade

More Related Content

Viewers also liked

херсонська мапа округів
херсонська мапа округівхерсонська мапа округів
херсонська мапа округівOlena Ursu
 
Tasks!!!!
Tasks!!!!Tasks!!!!
Tasks!!!!ajeetrs
 
Ecological problems in estonia
Ecological problems in estoniaEcological problems in estonia
Ecological problems in estoniaCarl Custav
 
Презентація офіційного сайту Вінницької міської ради.
Презентація офіційного сайту Вінницької міської ради.Презентація офіційного сайту Вінницької міської ради.
Презентація офіційного сайту Вінницької міської ради.Olena Ursu
 
воспитание патриотизма на уроках иностранного языка
воспитание патриотизма на уроках иностранного языкавоспитание патриотизма на уроках иностранного языка
воспитание патриотизма на уроках иностранного языкаDemanessa
 
Презентація від КП "Міськоформлення", м. Кременчук
Презентація від КП "Міськоформлення", м. КременчукПрезентація від КП "Міськоформлення", м. Кременчук
Презентація від КП "Міськоформлення", м. КременчукOlena Ursu
 
Bartender's Bash 2012 - Springfield MO
Bartender's Bash 2012 - Springfield MOBartender's Bash 2012 - Springfield MO
Bartender's Bash 2012 - Springfield MOMajor Brands
 
Documentos DE CONDUCION ECONOMICA
Documentos DE CONDUCION ECONOMICA Documentos DE CONDUCION ECONOMICA
Documentos DE CONDUCION ECONOMICA Raf Alv
 
My opinion on boom placer
My opinion on boom placerMy opinion on boom placer
My opinion on boom placerNitin Kumar
 
January February
January FebruaryJanuary February
January Februarynoel6354
 

Viewers also liked (19)

херсонська мапа округів
херсонська мапа округівхерсонська мапа округів
херсонська мапа округів
 
Tasks!!!!
Tasks!!!!Tasks!!!!
Tasks!!!!
 
9. bartoshyk
9. bartoshyk9. bartoshyk
9. bartoshyk
 
Divisibility
DivisibilityDivisibility
Divisibility
 
Subsets
SubsetsSubsets
Subsets
 
Mitarbeiter Porträts - bemü ag däniken
Mitarbeiter Porträts - bemü ag dänikenMitarbeiter Porträts - bemü ag däniken
Mitarbeiter Porträts - bemü ag däniken
 
Look Who's Talking
Look Who's TalkingLook Who's Talking
Look Who's Talking
 
Ecological problems in estonia
Ecological problems in estoniaEcological problems in estonia
Ecological problems in estonia
 
Презентація офіційного сайту Вінницької міської ради.
Презентація офіційного сайту Вінницької міської ради.Презентація офіційного сайту Вінницької міської ради.
Презентація офіційного сайту Вінницької міської ради.
 
Shaping sheet ptsd
Shaping sheet ptsdShaping sheet ptsd
Shaping sheet ptsd
 
Swissknife2
Swissknife2Swissknife2
Swissknife2
 
воспитание патриотизма на уроках иностранного языка
воспитание патриотизма на уроках иностранного языкавоспитание патриотизма на уроках иностранного языка
воспитание патриотизма на уроках иностранного языка
 
Sit, stay, good art
Sit, stay, good artSit, stay, good art
Sit, stay, good art
 
Презентація від КП "Міськоформлення", м. Кременчук
Презентація від КП "Міськоформлення", м. КременчукПрезентація від КП "Міськоформлення", м. Кременчук
Презентація від КП "Міськоформлення", м. Кременчук
 
Bartender's Bash 2012 - Springfield MO
Bartender's Bash 2012 - Springfield MOBartender's Bash 2012 - Springfield MO
Bartender's Bash 2012 - Springfield MO
 
Documentos DE CONDUCION ECONOMICA
Documentos DE CONDUCION ECONOMICA Documentos DE CONDUCION ECONOMICA
Documentos DE CONDUCION ECONOMICA
 
My opinion on boom placer
My opinion on boom placerMy opinion on boom placer
My opinion on boom placer
 
January February
January FebruaryJanuary February
January February
 
Barcelona syllabus 2015
Barcelona syllabus 2015Barcelona syllabus 2015
Barcelona syllabus 2015
 

Similar to Code accesssecurity

Up 2012 dave jilk - multi-tenancy in paa s (distribution version)
Up 2012   dave jilk - multi-tenancy in paa s (distribution version)Up 2012   dave jilk - multi-tenancy in paa s (distribution version)
Up 2012 dave jilk - multi-tenancy in paa s (distribution version)Khazret Sapenov
 
HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010Michael Noel
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Michael Noel
 
SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010
SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010 SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010
SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010 Michael Noel
 
The Efficient Use of Cyberinfrastructure to Enable Data Analysis Collaboration
The Efficient Use of Cyberinfrastructure  to Enable Data Analysis CollaborationThe Efficient Use of Cyberinfrastructure  to Enable Data Analysis Collaboration
The Efficient Use of Cyberinfrastructure to Enable Data Analysis CollaborationCybera Inc.
 
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Amazon Web Services
 
Zend In The Cloud
Zend In The CloudZend In The Cloud
Zend In The Cloudphptechtalk
 
Thick Application Penetration Testing: Crash Course
Thick Application Penetration Testing: Crash CourseThick Application Penetration Testing: Crash Course
Thick Application Penetration Testing: Crash CourseScott Sutherland
 
Security in the Cloud
Security in the CloudSecurity in the Cloud
Security in the CloudWSO2
 
Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 2
Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 2Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 2
Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 2ukdpe
 
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...VMworld
 
Citrix - More Applications, More Security, More Availability
Citrix - More Applications, More Security, More AvailabilityCitrix - More Applications, More Security, More Availability
Citrix - More Applications, More Security, More Availabilitydataplex systems limited
 
CloudStack-Developer-Day
CloudStack-Developer-DayCloudStack-Developer-Day
CloudStack-Developer-DayKimihiko Kitase
 
The state of packaged web apps
The state of packaged web appsThe state of packaged web apps
The state of packaged web appsCristiano Betta
 
AWS Summit 2011: Application Security Best Practices
AWS Summit 2011: Application Security Best PracticesAWS Summit 2011: Application Security Best Practices
AWS Summit 2011: Application Security Best PracticesAmazon Web Services
 
Mike Taulty TechDays 2010 Silverlight 4 - What's New?
Mike Taulty TechDays 2010 Silverlight 4 - What's New?Mike Taulty TechDays 2010 Silverlight 4 - What's New?
Mike Taulty TechDays 2010 Silverlight 4 - What's New?ukdpe
 
Windows Azure Platform
Windows Azure PlatformWindows Azure Platform
Windows Azure PlatformAsmTrash
 

Similar to Code accesssecurity (20)

Up 2012 dave jilk - multi-tenancy in paa s (distribution version)
Up 2012   dave jilk - multi-tenancy in paa s (distribution version)Up 2012   dave jilk - multi-tenancy in paa s (distribution version)
Up 2012 dave jilk - multi-tenancy in paa s (distribution version)
 
HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010HAD05: Collaborating with Extranet Partners on SharePoint 2010
HAD05: Collaborating with Extranet Partners on SharePoint 2010
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
 
SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010
SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010 SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010
SEASPC 2011 - Collaborating with Extranet Partners on SharePoint 2010
 
The Efficient Use of Cyberinfrastructure to Enable Data Analysis Collaboration
The Efficient Use of Cyberinfrastructure  to Enable Data Analysis CollaborationThe Efficient Use of Cyberinfrastructure  to Enable Data Analysis Collaboration
The Efficient Use of Cyberinfrastructure to Enable Data Analysis Collaboration
 
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
 
Private cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud securityPrivate cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud security
 
Zend In The Cloud
Zend In The CloudZend In The Cloud
Zend In The Cloud
 
Thick Application Penetration Testing: Crash Course
Thick Application Penetration Testing: Crash CourseThick Application Penetration Testing: Crash Course
Thick Application Penetration Testing: Crash Course
 
Security in the Cloud
Security in the CloudSecurity in the Cloud
Security in the Cloud
 
Security in the Cloud
Security in the CloudSecurity in the Cloud
Security in the Cloud
 
Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 2
Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 2Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 2
Mike Taulty DevDays 2010 Silverlight 4 - What's New Part 2
 
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
 
Citrix - More Applications, More Security, More Availability
Citrix - More Applications, More Security, More AvailabilityCitrix - More Applications, More Security, More Availability
Citrix - More Applications, More Security, More Availability
 
CloudStack-Developer-Day
CloudStack-Developer-DayCloudStack-Developer-Day
CloudStack-Developer-Day
 
Day CRX Introduction
Day CRX IntroductionDay CRX Introduction
Day CRX Introduction
 
The state of packaged web apps
The state of packaged web appsThe state of packaged web apps
The state of packaged web apps
 
AWS Summit 2011: Application Security Best Practices
AWS Summit 2011: Application Security Best PracticesAWS Summit 2011: Application Security Best Practices
AWS Summit 2011: Application Security Best Practices
 
Mike Taulty TechDays 2010 Silverlight 4 - What's New?
Mike Taulty TechDays 2010 Silverlight 4 - What's New?Mike Taulty TechDays 2010 Silverlight 4 - What's New?
Mike Taulty TechDays 2010 Silverlight 4 - What's New?
 
Windows Azure Platform
Windows Azure PlatformWindows Azure Platform
Windows Azure Platform
 

Recently uploaded

Gabriel_Carter_EXPOLRATIONpp.pptx........
Gabriel_Carter_EXPOLRATIONpp.pptx........Gabriel_Carter_EXPOLRATIONpp.pptx........
Gabriel_Carter_EXPOLRATIONpp.pptx........deejay178
 
Top profile Call Girls In Anantapur [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Anantapur [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Anantapur [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Anantapur [ 7014168258 ] Call Me For Genuine Models...gajnagarg
 
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...nirzagarg
 
Eden Gardens * High Profile Call Girls in Kolkata Phone No 8005736733 Elite E...
Eden Gardens * High Profile Call Girls in Kolkata Phone No 8005736733 Elite E...Eden Gardens * High Profile Call Girls in Kolkata Phone No 8005736733 Elite E...
Eden Gardens * High Profile Call Girls in Kolkata Phone No 8005736733 Elite E...HyderabadDolls
 
Low Cost Coimbatore Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call ...
Low Cost Coimbatore Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call ...Low Cost Coimbatore Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call ...
Low Cost Coimbatore Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call ...vershagrag
 
Mysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime Mysore
Mysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime MysoreMysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime Mysore
Mysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime Mysoremeghakumariji156
 
Top profile Call Girls In godhra [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In godhra [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In godhra [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In godhra [ 7014168258 ] Call Me For Genuine Models We...gajnagarg
 
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...Juli Boned
 
Maninagar ^ best call girls in Ahmedabad ₹7.5k Pick Up & Drop With Cash Payme...
Maninagar ^ best call girls in Ahmedabad ₹7.5k Pick Up & Drop With Cash Payme...Maninagar ^ best call girls in Ahmedabad ₹7.5k Pick Up & Drop With Cash Payme...
Maninagar ^ best call girls in Ahmedabad ₹7.5k Pick Up & Drop With Cash Payme...gragchanchal546
 
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...ZurliaSoop
 
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...yulianti213969
 
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证eqaqen
 
9352852248 Call Girls Sanand Escort Service Available 24×7 In Sanand
9352852248 Call Girls  Sanand Escort Service Available 24×7 In Sanand9352852248 Call Girls  Sanand Escort Service Available 24×7 In Sanand
9352852248 Call Girls Sanand Escort Service Available 24×7 In Sanandgargpaaro
 
Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Top profile Call Girls In Varanasi [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Varanasi [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Varanasi [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Varanasi [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime MalegaonVip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaonmeghakumariji156
 
Howrah [ Call Girls Kolkata ₹7.5k Pick Up & Drop With Cash Payment 8005736733...
Howrah [ Call Girls Kolkata ₹7.5k Pick Up & Drop With Cash Payment 8005736733...Howrah [ Call Girls Kolkata ₹7.5k Pick Up & Drop With Cash Payment 8005736733...
Howrah [ Call Girls Kolkata ₹7.5k Pick Up & Drop With Cash Payment 8005736733...HyderabadDolls
 
Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...
Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...
Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...ZurliaSoop
 

Recently uploaded (20)

Gabriel_Carter_EXPOLRATIONpp.pptx........
Gabriel_Carter_EXPOLRATIONpp.pptx........Gabriel_Carter_EXPOLRATIONpp.pptx........
Gabriel_Carter_EXPOLRATIONpp.pptx........
 
Top profile Call Girls In Anantapur [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Anantapur [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Anantapur [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Anantapur [ 7014168258 ] Call Me For Genuine Models...
 
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Etawah [ 7014168258 ] Call Me For Genuine Models We...
 
Eden Gardens * High Profile Call Girls in Kolkata Phone No 8005736733 Elite E...
Eden Gardens * High Profile Call Girls in Kolkata Phone No 8005736733 Elite E...Eden Gardens * High Profile Call Girls in Kolkata Phone No 8005736733 Elite E...
Eden Gardens * High Profile Call Girls in Kolkata Phone No 8005736733 Elite E...
 
Low Cost Coimbatore Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call ...
Low Cost Coimbatore Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call ...Low Cost Coimbatore Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call ...
Low Cost Coimbatore Call Girls Service 👉📞 6378878445 👉📞 Just📲 Call Ruhi Call ...
 
Mysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime Mysore
Mysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime MysoreMysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime Mysore
Mysore Escorts Service Girl ^ 9332606886, WhatsApp Anytime Mysore
 
Top profile Call Girls In godhra [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In godhra [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In godhra [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In godhra [ 7014168258 ] Call Me For Genuine Models We...
 
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
Specialize in a MSc within Biomanufacturing, and work part-time as Process En...
 
Maninagar ^ best call girls in Ahmedabad ₹7.5k Pick Up & Drop With Cash Payme...
Maninagar ^ best call girls in Ahmedabad ₹7.5k Pick Up & Drop With Cash Payme...Maninagar ^ best call girls in Ahmedabad ₹7.5k Pick Up & Drop With Cash Payme...
Maninagar ^ best call girls in Ahmedabad ₹7.5k Pick Up & Drop With Cash Payme...
 
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
 
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...
obat aborsi pacitan wa 081336238223 jual obat aborsi cytotec asli di pacitan0...
 
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
 
9352852248 Call Girls Sanand Escort Service Available 24×7 In Sanand
9352852248 Call Girls  Sanand Escort Service Available 24×7 In Sanand9352852248 Call Girls  Sanand Escort Service Available 24×7 In Sanand
9352852248 Call Girls Sanand Escort Service Available 24×7 In Sanand
 
Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Jabalpur [ 7014168258 ] Call Me For Genuine Models ...
 
Top profile Call Girls In Varanasi [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Varanasi [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Varanasi [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Varanasi [ 7014168258 ] Call Me For Genuine Models ...
 
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime MalegaonVip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
 
Girls in Aiims Metro (delhi) call me [🔝9953056974🔝] escort service 24X7
Girls in Aiims Metro (delhi) call me [🔝9953056974🔝] escort service 24X7Girls in Aiims Metro (delhi) call me [🔝9953056974🔝] escort service 24X7
Girls in Aiims Metro (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Howrah [ Call Girls Kolkata ₹7.5k Pick Up & Drop With Cash Payment 8005736733...
Howrah [ Call Girls Kolkata ₹7.5k Pick Up & Drop With Cash Payment 8005736733...Howrah [ Call Girls Kolkata ₹7.5k Pick Up & Drop With Cash Payment 8005736733...
Howrah [ Call Girls Kolkata ₹7.5k Pick Up & Drop With Cash Payment 8005736733...
 
Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...
Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...
Jual obat aborsi Dubai ( 085657271886 ) Cytote pil telat bulan penggugur kand...
 
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
 

Code accesssecurity

  • 2. Why Implement CAS? Web App running with full trust File Upload Malicious Code
  • 3. File Dialog Environment Printing Variables Assembly
  • 4. Internet Local Intranet Nothing • File Dialog • Environment • Isolated Variables Storage File • File Dialog • Security • Isolated • User Interface Storage File • Printing • Reflection • Security • User Interface • DNS • Printing
  • 5. Assembly Application Publisher Strong URL Site Zone Hash Directory Name
  • 6. Permission Membership Code Group Set Condition
  • 7. Code Group A Membership Conditions Assembly Evidence Code Group B Membership Conditions Code Group C Membership Conditions
  • 8. Assembly A X Assembly A X .NET 2.0 .NET 1.1 X Assembly A
  • 10. App Domain Permissions – Full Trust Main Foo App Domain Permissions - Internet Bar File Read
  • 11. -Heterogeneous App domain not possible now - Assemblies with lower trust level could upgrade themselves to a higher trust level by calling partially trusted assemblies -App domains previously had to be loaded after CAS was in place.
  • 12.
  • 13.
  • 14.
  • 15.  Static Analysis Possible  Sandboxing Easier  No permission set overlap due to heterogeneous app domains  Permission grant sets not machine dependent  Assembly with a lower trust level can not call an assembly with higher trust level and upgrade

Editor's Notes

  1. Code access security is not implemented to prevent you from performing illegal operations through your code. It is implemented to make sure somebody using your application (website/dll/…) does not get privilege to perform an illegal operation. For example, somebody could upload a file containing malicious code to your website running under full trust. If this file is uploaded to the server root and made available through a link, the user could simply access the link and run the file.
  2. Every application (website/dll…) can have a certain set of permissions attached to it. For example, if you have a simple webpage that performs currency conversion, it does not need file dialog permissions. However, a form that allows you to upload your profile picture on facebook would need file dialog permissions. Every application can be analyzed to figure out the exact and minimal permission set required for proper functioning.
  3. While defining code access security, the first thing to set up is permission sets. New permission sets can be created as per requirements or existing permission sets can be used for defining the boundaries of your application. Some of the existing permission sets that are created by default are shown. A permission set can also be empty – indicating that the application(s) to which this permission set is assigned has no permissions at all. Such an application would not be able to run.
  4. In order to assign a permission set to an assembly, certain criteria has to be met. For example, I can say that I want permission set “Everything” to be assigned to all local applications (running from my own system). The runtime security now has to figure out whether an assembly that is trying to run is local. Thus, there is a need for attaching some sort of metadata to all assemblies, which acts as evidence for that assembly. The assembly has to provide evidence of before runtime security judges it and assigns permissions to it. This metadata can include the Application Directory, Publisher, URL (from which the application is running), Site, Zone, Hash, and SN – as shown.
  5. The permission set along with the membership condition (evidence needed to deserve that permission set) form a code group.
  6. As discussed, when an assembly tries to run, it’s evidence is compared with the membership conditions and accordingly, the appropriate code group and its permission set are assigned to that assembly.
  7. Some of the drawbacks of this security model (followed till.NET 3.5) were:Security policies had to be set independently for all systems. Thus, if your application was moved from one system to another with different CAS settings, there were chances of your application not working.Even if the default settings for CAS were used, there were chances that moving your application from a system using .NET 1.1 to the one using .NET 2.0 would break it.Moving an application from the local system to a share on the network could also change the permission set assigned, as then the application evidence would change to reflect the “network” zone instead of “local”.
  8. In CLR 4, the permission check is now performed at the host level instead of the CLR level. Policies are no longer validated at the CLR level. If the host assigns a certain set of permissions to an assembly, the CLR accepts the same. Some examples of hosts are ASP.NET and SQL CLR. These hosts are now responsible for loading their applications in appropriate sandboxes, which have appropriate permissions assigned to them.
  9. Earlier (.NET 1.1/2.0/3.5) when the file read operation in App Domain B was encountered, a permission check used to be stack traced right to the Main function of App Domain A. Not so now. For CLR 4, an App Domain independently has its own permission sets. Thus, for CLR 4, when the File Read operation for App Domain B is called, the permission stack trace would check permissions on Bar, Domain B, and then stop. If either of the checks along the stack trace fail, this file read operation would not be permitted.
  10. These are the transparency levels for CLR 4. These can be compared to full-trust and partial trust. However, every piece of code can now be one of the three:Transparent (minimal permissions assigned, highly un-trusted)Safe critical (bridge between transparent and critical code)Critical (maximum permissions assigned, thus, most trusted)
  11. According to the new CAS model, a piece of code that is security transparent (un-trusted and with least permissions) cannot directly call a Security Critical (full trust) code. The security safe critical code acts as a bridge between these two types of code. Safe critical code generally contains all verification logic which ensures that a piece of security transparent code that is trying to call a security critical code actually deserves to be permitted. Thus, if a security transparent code does not have file I/O permissions and it is trying to call a security critical code which does have these permissions, this request would not go through. A piece of code is not allowed to upgrade it’s permission set.