— Riley Dickens, consultant, Encryption Consulting
When downloading software from the Internet, consumers must always be wary of third parties masquerading as the developer of the software. With a resource like code signing, users can be assured the software they are downloading is from a safe source. Code signing is an operation where a software developer or distributor digitally signs the file being sent out, to assure users that they are receiving software that does what the creator says it will. The signature also acts as proof the code has not been tampered with or modified from its original form.
Code signing has become more and more important for software developers and distributors. An attacker can easily mask themselves as a legitimate source to plant malware on a victim’s computer. Code signing assures these types of attacks cannot occur, as long as users only download software deemed safe by their operating system. Nowadays, when software is downloaded onto a computer, the operating system checks for the digital certificate created through code signing, to assure the safety of the software that will be installed. If no digital certificate is found, then the user is alerted to this fact, and prompted to either download the software anyway, or stop the download process.
The digital identities used to validate the authenticity and integrity of applications, firmware, and software must be properly managed and protected. Weak digital certificate management can easily lead to the degradation of application integrity or malicious actors exploiting these assets as a means of attack.
Join Encryption Consulting and Futurex for a webinar on December 9, where will discuss the potential ramifications of such attacks, how they can be mitigated, and how organizations can evolve existing code signing islands into a secure, well-defined process.