Code signing security: Exploring where the vulnerabilities lie

Abusing Code Signing for Profit

Cover

Since its inception, the process of code signing was designed to give the operating system a way to determine legitimate and potentially malicious software.

However, the inherently trusting nature of this system can be easily manipulated by malicious actors.

In a recent study, Chronicle conducted research in order to better understand this issue. Download this white paper to uncover the results from the study.

Vendor:
Chronicle
Posted:
11 Feb 2020
Published:
11 Feb 2020
Format:
PDF
Length:
4 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!