Introducing XAML and Activity Assembly Spoofing [Video]

What happens to a Workflow if an attacker can lure the workflow host into running XAML which references an assembly replaced by the attacker? This's what called an Activity Assembly Spoofing attack.In this episode Ron Jacob show you how it can happen, what you need to know about the security model and what you can […]

What happens to a Workflow if an attacker can lure the workflow host into running XAML which references an assembly replaced by the attacker? This's what called an Activity Assembly Spoofing attack.

In this episode Ron Jacob show you how it can happen, what you need to know about the security model and what you can do to prevent it.