repurposing attack 是什么攻击?

来源:百度知道 编辑:UC知道 时间:2024/05/30 04:38:53

Figure 8 Preventing a Repurposing AttackThere are two common schemes for organizing the layout of an add-in. The first is to place all add-in assemblies in a subdirectory of the hosting application (for example, \AppDir\AddIns). Another scheme is to have a separate subdirectory for each add-in. By separating the add-ins from each other, you prevent them from being able to load each other at run time.

Deciding between these two schemes is largely dependent upon the goals of your application. Separate directories for add-ins allow you to isolate each add-in from the others, but comes at the cost of requiring a new AppDomain for each add-in. On the other hand, placing every add-in in the same directory allows you to use only a single sandboxed AppDomain, but leaves the add-ins free to interfere with each other.