Questions tagged [code-access-security]

Code-access security is security specific to limiting access to or protecting source code, through the use of processes such as encryption, obfuscation, and more.

Code-access security is security specific to limiting access to or protecting source code, through the use of processes such as , , and more. The goal of code-access security is most often to protect functionality from competitors, to prevent reverse-engineering, or to preserve integrity of program communication protocols.

For more on obfuscation:

Note that security questions which are not about a specific programming problem may be better suited to our sister site, IT Security Stack Exchange.

337 questions
0
votes
1 answer

Is it a good idea to encrypt the attribute of coredata?

How to protect Sqlite file during reverse engineering? IS is possible to encrypt the complete sqlite file in document directory or we have to encrypt the attribute of core data?
0
votes
0 answers

Why would creating registry subkey return NullReferenceException only for some computers?

There is a .NET application written in c sharp which requires communication with a .asmx WebService upon registration. A number of users have reported on the btnRegister click event the following error: NullReferenceException: Object reference not…
0
votes
1 answer

How to access relatively places text files in folders below a Silverlight .xap file?

In a WPF application, I load in xaml files with the xamlreader by finding the current directory like this: public static string GetApplicationDirectory() { return System.IO.Path.GetDirectoryName(Assembly.GetExecutingAssembly().Location); } so I…
Edward Tanguay
  • 189,012
  • 314
  • 712
  • 1,047
0
votes
1 answer

How to remove full trust from assembly, which no longer exists on the disk?

I am running this command: C:\work\CreateInstanceTest\bin\Release>caspol -u -lf | findstr /i createinstancetest 22. CreateInstanceTest 0.0.0.0 = StrongName -…
mark
  • 59,016
  • 79
  • 296
  • 580
0
votes
0 answers

Hacking PHP page checking if a session cookie variable is set and exposing its name

This page exposes the cookie session name and that is has to be set to give access to the super secret key. Can this be hacked, like setting the cookie remotely somehow and in that case how?
K. Kilian Lindberg
  • 2,918
  • 23
  • 30
0
votes
0 answers

What permission set does the AppDomain CreateInstance required?

I have the following code, appDomain.CreateInstance( assemblyName, typeName, false, BindingFlags.NonPublic | BindingFlags.Instance, null, new object[] { language, encoding }, CultureInfo.CurrentCulture,…
Imran Qadir Baksh - Baloch
  • 32,612
  • 68
  • 179
  • 322
0
votes
3 answers

Derived types must either match the security accessibility of the base type or be less accessible in very basic case

Build the sample code, and run any test. (I tried abs.) Each time I do it, I get TypeLoadException: An exception of type 'System.TypeLoadException' occurred in Jurassic.dll but was not handled in user code Additional information: Inheritance…
LOST
  • 2,956
  • 3
  • 25
  • 40
0
votes
1 answer

When to use SharePointPermissionAttribute

When do I actually need to decorate my methods with the SharePointPermission attribute? I've come across some code samples that have them and some that don't.
Chris
  • 4,393
  • 1
  • 27
  • 33
0
votes
1 answer

Hidden variable in closure in .Net

I have some C# code. It has some configuration settings that stored as auto property or private fields. In theory the person who uses it can modify private variables via Reflection. Is there a way to deny it? I can use readonly static fields, and…
Sergey Litvinov
  • 7,408
  • 5
  • 46
  • 67
0
votes
1 answer

Duo security: how to pass arguments through post_argument on Duo.init() in two factor authentication

I am using Duo Security for implementing two factor authentication on my site. The problem is i need to pass some arguments with values. Somebody said, this can be done through to use post_argument(The argument for signed response in post_action).…
0
votes
1 answer

Is it possible to store all your iOS App data in Library/Preferences folder?

The concern here is more of security. Recently I came across an app security issue: I stored all my Database and downloaded PDF files in to App's Document Directory, but i realized that the content is vulnerable. If some X user get hand on ipa file…
Meet
  • 4,904
  • 3
  • 24
  • 39
0
votes
1 answer

Securing Java application code and configuration from user written code

I want to give my client limited access to a server dedicated to him where a Java app is running. The client will write some plugins and run the Java app (it's a console app). The app has code which I would like to protect from decompiling and…
derenik
  • 163
  • 5
0
votes
1 answer

Hiding dynamically generated XML file from website visitors

I'm working on a project which requires integration of Google Maps with my website. Now, my data (latitude/longitude, etc) are in a MySQL table. A PHP query runs on the MySQL to dynamically generate an XML file. This XML file is then used by the…
0
votes
1 answer

How to achieve a secure validation ticket in javascript

Is it possible to create a secure (not easily hackable/reverse engineered) server request token from javascript code (visible to anyone) which can be validated at the server side. To understand the question better here is the scenario depicted as an…
Stacked
  • 841
  • 2
  • 12
  • 23
0
votes
1 answer

java: Preventing malicious change or modification on some public functions in java packages

I am writing a license management system for our project and it is critical that it work regularly and correctly. I have written some methods with public access in a package; for example // code to check correctness of password public boolean…
sajad
  • 2,094
  • 11
  • 32
  • 52