473,406 Members | 2,816 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,406 software developers and data experts.

Check assembly for integrity?

Hello,

I'm currently developing a Windows Service that should dynamically load
assemblies ("plug-ins") for special tasks. As the service runs with
Local-System privileges I am not willing to load arbritrary code without
verifying it first. My idea was to check if the assembly is signed with
the same key as "I" (== the loading assembly) am.

Is the Public Key of AssemblyName reliably the public key the assembly
was signed with? Is there any way to verify if the assembly has been
verified (i.e. has not been excluded from checks with "sn.exe -Vr")?

Thanks in advance!

Best Regards,
Martin
Aug 4 '06 #1
2 2596
Yes, you can bypass verification skipping when evaluting strong name
validity, but it requires a p/invoke call. See
http://blogs.msdn.com/shawnfa/archiv...07/150378.aspx for details.
"Martin Carpella" <ma*************@gmx.netwrote in message
news:87************@msgid.carpella.net...
Hello,

I'm currently developing a Windows Service that should dynamically load
assemblies ("plug-ins") for special tasks. As the service runs with
Local-System privileges I am not willing to load arbritrary code without
verifying it first. My idea was to check if the assembly is signed with
the same key as "I" (== the loading assembly) am.

Is the Public Key of AssemblyName reliably the public key the assembly
was signed with? Is there any way to verify if the assembly has been
verified (i.e. has not been excluded from checks with "sn.exe -Vr")?

Thanks in advance!

Best Regards,
Martin
Aug 4 '06 #2
"Nicole Calinoiu" <calinoiu REMOVETHIS AT gmail DOT comwrites:
Yes, you can bypass verification skipping when evaluting strong name
validity, but it requires a p/invoke call. See
http://blogs.msdn.com/shawnfa/archiv...07/150378.aspx for details.
Wow, thanks, that was exactly what I was looking for! Thanks a lot!

Best regards,
Martin
Aug 6 '06 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
by: Dmitri Shvetsov | last post by:
Hi, What methods can we use to check the integrity problems? Some records in my database are having Foreign Keys but the database doesn't have any related records with required Primary Keys. I...
3
by: RAD | last post by:
I am working with an evaluation copy of SQL Server 2000 for the first time; my DB experience lies with MS Access. I have a simple table in SQL Server (tblCompany) that has a field called...
2
by: Brice | last post by:
Hello, Sorry if this is a basic question but I can't seem to find the answer in the DB2 tutorial series or my DB2 manuals. How does one check the data integrity and referential integrity of an...
3
by: Stephen | last post by:
This is probably something simple but I've been trying for a while now and can't seem to get it. I'm loading a table from an IXF file with the following command 'load from...
1
by: huyuhui | last post by:
The following is a question of LOAD utility. Question: How does the DB2 enforce table check constraints for data added to table with the LOAD utility? A. With the BUILD phase of LOAD B. With the...
2
by: Che.Gonzalez | last post by:
Can a project or assembly limit the projects that may reference it? For example, I have a legacy project used by a data layer project. I don't want the object model project to be able to directly...
16
by: Brian Tkatch | last post by:
Is there a way to check the order in which SET INTEGRITY needs to be applied? This would be for a script with a dynamic list of TABLEs. B.
1
by: giftson.john | last post by:
Hi, Anybody knows how to check the file integrity? I need to check the file integrity whether it is corrupt or not. Can anyone please advice?
6
by: Hemant Shah | last post by:
Folks, One of our clients is performing an audit, and the auditor(s) asked following question, and I am not sure how to answer it: 28. Is there a control that prevents the corruption of...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.