Questions tagged [code-access-security]

Code-access security is security specific to limiting access to or protecting source code, through the use of processes such as encryption, obfuscation, and more.

Code-access security is security specific to limiting access to or protecting source code, through the use of processes such as , , and more. The goal of code-access security is most often to protect functionality from competitors, to prevent reverse-engineering, or to preserve integrity of program communication protocols.

For more on obfuscation:

Note that security questions which are not about a specific programming problem may be better suited to our sister site, IT Security Stack Exchange.

337 questions
3
votes
1 answer

Get legacy CAS Model value programmatically in ASP.NET

I use VS 2012 and ASP.NET 4.5. How can I know if legacy CAS model is enabled programmatically in C# (executing my code in ASP.NET 2.0 - CLR 2.0 , and ASP.NET 4.5 (CLR 4.0) ? and which level ?
Kiquenet
  • 14,494
  • 35
  • 148
  • 243
3
votes
5 answers

Application Reverse Engineering Protection / Hardening

I want to protect my applications from reverse engineering. What I would like to do is protect the executable from any tampering, such as with hex editors, resource editors, and dis-assembly tampering. My idea is to have the application check the…
3
votes
1 answer

Enable/disable code access through license key - Application versioning

I have written a POS application, and now i want to create different versions of it. Something like a basic version, a premium version and a Full version. So if a client pays more they get more features in the same application. Is it possible that i…
Xience
  • 351
  • 2
  • 8
  • 22
3
votes
2 answers

Cannot create .apk file after introducing Crypto Obfuscator into Xamarin.Android project

I have a task of obfuscating my Xamarin Android project (let call it AndrProj) together with libraries it references: two PCL (let's call them PCL1 and PCL2) and Android library (AndrLib). PCL2 and AndrLib also have references to PCL1. I was…
foxanna
  • 1,570
  • 13
  • 26
3
votes
1 answer

owasp automated code review tools

We have developed a lot of code and unfortunately some of it may not be compliant and could have security flaws in accordance with the OWASP top ten. Does anyone have any guidance on automated code review tools which will check specifically for the…
user1107753
  • 1,566
  • 4
  • 24
  • 36
3
votes
3 answers

How to tell whether Code Access Security is allowed in library code

In .NET 4 Code Access Security (CAS) is deprecated. Whenever you call a method that implicitly uses it, it fails with a NotSupportedException, that can be resolved with a configuration switch that makes it fall back to the old behavior. We have a…
Sander Rijken
  • 21,376
  • 3
  • 61
  • 85
3
votes
1 answer

Grant FullTrust in trusted assembly called by partial trust assembly

imagine the following environment: an XBAP application running in partial trust mode (default behaviour; requiring Full Trust is not an option - but before you ask, if full trust is given to the XBAP, everything works as expected) is referencing a…
thmshd
  • 5,729
  • 3
  • 39
  • 67
3
votes
0 answers

Javascript API - Restrict Domain by providing whitelisting option to user

My Application provides an API Key and Javascript code to put on their site (similar to google anayytics code). All the calls in the API use JSONP to communicate with our server. Since the API key is sensitive, we have our users coming back and…
cloudpre
  • 1,001
  • 2
  • 15
  • 28
3
votes
1 answer

Excel DNA Code Access Security

I have a simple excel DNA add in, created in version 0.32. In my add-in I am dynamically loading another assembly that is found on a network drive. When I load my excel DNA add-in into Excel and run my Excel-DNA function, I get the following error :…
caa
  • 406
  • 1
  • 8
  • 16
3
votes
4 answers

Create delegate of array get method fails

Trying to create a delegate to access an array, I get an ArgumentException saying that the method could not be bound. Cannot bind to the target method because its signature or security transparency is not compatible with that of the delegate…
Georg
  • 5,626
  • 1
  • 23
  • 44
3
votes
1 answer

Is there a CASPOL.exe GUI command line generator?

Is there a simple utility/GUI application for generating CASPOL commands?
Brandon
  • 13,956
  • 16
  • 72
  • 114
3
votes
4 answers

Using the .NET Framework security system

I was wondering - do any of you actually use the various classes in the System.Security.Permissions namespace? I mainly develop desktop/server-side components (i.e., no web) and the general assumption is that FullTrust is always available and no…
Yuval
  • 1,382
  • 10
  • 22
3
votes
1 answer

How to run user-submitted modules securely in a node.js?

We are planning to develop a business oriented application platform on node.js + express. And we like to allow users to run their own native node.js modules (set of files js, css, html), so generally it should be like portal and portles/servlets.…
sultan
  • 4,543
  • 2
  • 24
  • 32
3
votes
2 answers

Let the user choose to grant permission in android

We have a AutoCompleteTextView which is able to read from the users-contact-data as a convenience. However some users complain about the "READ_CONTACT" Permission the App is enforcing at installation. Is there any Way to let the user Choose to grant…
Rafael T
  • 15,401
  • 15
  • 83
  • 144
2
votes
1 answer

How to read keystore values?

I have a android library. I need to add function to check whether only valid users use this library. In order to this I need to read the values from android keystore. How can I read values from android keystore ?
Chrishan
  • 4,076
  • 7
  • 48
  • 67