Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build by Slava Gomzin, Slava Gomzin
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Slava Gomzin ISBN: 9781476313184
Publisher: Slava Gomzin Publication: April 22, 2012
Imprint: Smashwords Edition Language: English
Author: Slava Gomzin
ISBN: 9781476313184
Publisher: Slava Gomzin
Publication: April 22, 2012
Imprint: Smashwords Edition
Language: English

Booklet for developers and security professionals on how to implement code obfuscation, .NET strong name signing, and Authenticode code signing in order to protect applications deployment. The guide contains detailed description of different code signing implementation options from basic software to sophisticated hardware solution.

Topics include: reasons to implement code obfuscation and signing, obfuscation and strong name signing dependencies, description of Authenticode signing process, singing certificates and certificate authorities, signing certificate private key storage: hardware vs. software, three ways to implement code signing, and more (Article: ~4,460 words).

Table of Contents includes:

  1. Introduction
    Several Reasons to Implement Code Obfuscation and Signing
    Additional Benefits of Strong Name Signing
    Additional Benefits of Authenticode Signing
  2. Code Obfuscation and Strong Name Signing
    Code Obfuscation Tools
    Obfuscation Project and Strong Name Signing
    Obfuscation and Strong Name Signing from Command Line
  3. Authenticode Code Signing
    Code Signing
    Digital Signatures
    How Code Signing Works
    Authenticode
    Code Signing Certificate
    X.509 Standard
    Obtaining Code Signing Certificate
    Signing Certificate Pricing
    Code Signing Certificate Storage: Hardware vs. Software
    Time Stamping
    Certificate Validity (Expiration Date)
  4. Implementing Authenticode Signing
    Code Signing Process à la Microsoft
    Code Signing Implementation Options: Advantages, Disadvantages, Costs
    Option 1: “Full Hardware”
    Option 2: “Basic Software”
    Option 3: “Combined Software/Hardware”
  5. Tips on Implementing “Combined Software/Hardware” Option
    Requirements to Signing Application
  6. Tips on Implementing “Basic Software” Option
    Installing Code Signing Certificate on Signing Server
    SignTool
    Installing SignTool
    Using SignTool
  7. Testing
    Testing Obfuscation
    Testing Strong Name Signatures
    Testing Authenticode Signatures
  8. Resources
    Tools and Products
    Authenticode Certificates Offered by Public Certificate Authorities
    Online Authenticode Timestamping Services
    Standards
    Articles
    Books
    About the Author

Slava Gomzin, CISSP, ECSP, Security+ has more than 15 years of professional experience in software development and application security. He is Security Architect at Retalix USA.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Booklet for developers and security professionals on how to implement code obfuscation, .NET strong name signing, and Authenticode code signing in order to protect applications deployment. The guide contains detailed description of different code signing implementation options from basic software to sophisticated hardware solution.

Topics include: reasons to implement code obfuscation and signing, obfuscation and strong name signing dependencies, description of Authenticode signing process, singing certificates and certificate authorities, signing certificate private key storage: hardware vs. software, three ways to implement code signing, and more (Article: ~4,460 words).

Table of Contents includes:

  1. Introduction
    Several Reasons to Implement Code Obfuscation and Signing
    Additional Benefits of Strong Name Signing
    Additional Benefits of Authenticode Signing
  2. Code Obfuscation and Strong Name Signing
    Code Obfuscation Tools
    Obfuscation Project and Strong Name Signing
    Obfuscation and Strong Name Signing from Command Line
  3. Authenticode Code Signing
    Code Signing
    Digital Signatures
    How Code Signing Works
    Authenticode
    Code Signing Certificate
    X.509 Standard
    Obtaining Code Signing Certificate
    Signing Certificate Pricing
    Code Signing Certificate Storage: Hardware vs. Software
    Time Stamping
    Certificate Validity (Expiration Date)
  4. Implementing Authenticode Signing
    Code Signing Process à la Microsoft
    Code Signing Implementation Options: Advantages, Disadvantages, Costs
    Option 1: “Full Hardware”
    Option 2: “Basic Software”
    Option 3: “Combined Software/Hardware”
  5. Tips on Implementing “Combined Software/Hardware” Option
    Requirements to Signing Application
  6. Tips on Implementing “Basic Software” Option
    Installing Code Signing Certificate on Signing Server
    SignTool
    Installing SignTool
    Using SignTool
  7. Testing
    Testing Obfuscation
    Testing Strong Name Signatures
    Testing Authenticode Signatures
  8. Resources
    Tools and Products
    Authenticode Certificates Offered by Public Certificate Authorities
    Online Authenticode Timestamping Services
    Standards
    Articles
    Books
    About the Author

Slava Gomzin, CISSP, ECSP, Security+ has more than 15 years of professional experience in software development and application security. He is Security Architect at Retalix USA.

More books from Application Software

Cover of the book Communicating Pictures by Slava Gomzin
Cover of the book Moodle Theme Development by Slava Gomzin
Cover of the book Twitter and Political Communication by Slava Gomzin
Cover of the book Master Intuit QuickBooks Online: From Setup to Tax Time by Slava Gomzin
Cover of the book iOS Security by Slava Gomzin
Cover of the book Digital Identity and Access Management by Slava Gomzin
Cover of the book Mechatronics by Bond Graphs by Slava Gomzin
Cover of the book Internet and the Law: Technology, Society, and Compromises, 2nd Edition by Slava Gomzin
Cover of the book Securing SAP S/4HANA by Slava Gomzin
Cover of the book Become a freelance graphic designer by Slava Gomzin
Cover of the book Cyber Security Standards, Practices and Industrial Applications by Slava Gomzin
Cover of the book Podcasting for Teachers Revised 2nd Edition by Slava Gomzin
Cover of the book Metasploit Bootcamp by Slava Gomzin
Cover of the book Programmation VBA pour Excel 2010, 2013 et 2016 pour les Nuls grand format by Slava Gomzin
Cover of the book Data Breach Preparation and Response by Slava Gomzin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy