Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build by Slava Gomzin, Slava Gomzin
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Slava Gomzin ISBN: 9781476313184
Publisher: Slava Gomzin Publication: April 22, 2012
Imprint: Smashwords Edition Language: English
Author: Slava Gomzin
ISBN: 9781476313184
Publisher: Slava Gomzin
Publication: April 22, 2012
Imprint: Smashwords Edition
Language: English

Booklet for developers and security professionals on how to implement code obfuscation, .NET strong name signing, and Authenticode code signing in order to protect applications deployment. The guide contains detailed description of different code signing implementation options from basic software to sophisticated hardware solution.

Topics include: reasons to implement code obfuscation and signing, obfuscation and strong name signing dependencies, description of Authenticode signing process, singing certificates and certificate authorities, signing certificate private key storage: hardware vs. software, three ways to implement code signing, and more (Article: ~4,460 words).

Table of Contents includes:

  1. Introduction
    Several Reasons to Implement Code Obfuscation and Signing
    Additional Benefits of Strong Name Signing
    Additional Benefits of Authenticode Signing
  2. Code Obfuscation and Strong Name Signing
    Code Obfuscation Tools
    Obfuscation Project and Strong Name Signing
    Obfuscation and Strong Name Signing from Command Line
  3. Authenticode Code Signing
    Code Signing
    Digital Signatures
    How Code Signing Works
    Authenticode
    Code Signing Certificate
    X.509 Standard
    Obtaining Code Signing Certificate
    Signing Certificate Pricing
    Code Signing Certificate Storage: Hardware vs. Software
    Time Stamping
    Certificate Validity (Expiration Date)
  4. Implementing Authenticode Signing
    Code Signing Process à la Microsoft
    Code Signing Implementation Options: Advantages, Disadvantages, Costs
    Option 1: “Full Hardware”
    Option 2: “Basic Software”
    Option 3: “Combined Software/Hardware”
  5. Tips on Implementing “Combined Software/Hardware” Option
    Requirements to Signing Application
  6. Tips on Implementing “Basic Software” Option
    Installing Code Signing Certificate on Signing Server
    SignTool
    Installing SignTool
    Using SignTool
  7. Testing
    Testing Obfuscation
    Testing Strong Name Signatures
    Testing Authenticode Signatures
  8. Resources
    Tools and Products
    Authenticode Certificates Offered by Public Certificate Authorities
    Online Authenticode Timestamping Services
    Standards
    Articles
    Books
    About the Author

Slava Gomzin, CISSP, ECSP, Security+ has more than 15 years of professional experience in software development and application security. He is Security Architect at Retalix USA.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Booklet for developers and security professionals on how to implement code obfuscation, .NET strong name signing, and Authenticode code signing in order to protect applications deployment. The guide contains detailed description of different code signing implementation options from basic software to sophisticated hardware solution.

Topics include: reasons to implement code obfuscation and signing, obfuscation and strong name signing dependencies, description of Authenticode signing process, singing certificates and certificate authorities, signing certificate private key storage: hardware vs. software, three ways to implement code signing, and more (Article: ~4,460 words).

Table of Contents includes:

  1. Introduction
    Several Reasons to Implement Code Obfuscation and Signing
    Additional Benefits of Strong Name Signing
    Additional Benefits of Authenticode Signing
  2. Code Obfuscation and Strong Name Signing
    Code Obfuscation Tools
    Obfuscation Project and Strong Name Signing
    Obfuscation and Strong Name Signing from Command Line
  3. Authenticode Code Signing
    Code Signing
    Digital Signatures
    How Code Signing Works
    Authenticode
    Code Signing Certificate
    X.509 Standard
    Obtaining Code Signing Certificate
    Signing Certificate Pricing
    Code Signing Certificate Storage: Hardware vs. Software
    Time Stamping
    Certificate Validity (Expiration Date)
  4. Implementing Authenticode Signing
    Code Signing Process à la Microsoft
    Code Signing Implementation Options: Advantages, Disadvantages, Costs
    Option 1: “Full Hardware”
    Option 2: “Basic Software”
    Option 3: “Combined Software/Hardware”
  5. Tips on Implementing “Combined Software/Hardware” Option
    Requirements to Signing Application
  6. Tips on Implementing “Basic Software” Option
    Installing Code Signing Certificate on Signing Server
    SignTool
    Installing SignTool
    Using SignTool
  7. Testing
    Testing Obfuscation
    Testing Strong Name Signatures
    Testing Authenticode Signatures
  8. Resources
    Tools and Products
    Authenticode Certificates Offered by Public Certificate Authorities
    Online Authenticode Timestamping Services
    Standards
    Articles
    Books
    About the Author

Slava Gomzin, CISSP, ECSP, Security+ has more than 15 years of professional experience in software development and application security. He is Security Architect at Retalix USA.

More books from Application Software

Cover of the book Fuzzy Logic for Image Processing by Slava Gomzin
Cover of the book Hackercool Sept 2016 by Slava Gomzin
Cover of the book Photoshop CS5 Pour les Nuls by Slava Gomzin
Cover of the book IBM Worklight Mobile Application Development Essentials by Slava Gomzin
Cover of the book Your Digital Footprint Password Protection Requirements by Slava Gomzin
Cover of the book PowerPoint 2007 For Dummies by Slava Gomzin
Cover of the book Kali Linux Network Scanning Cookbook - Second Edition by Slava Gomzin
Cover of the book Towards Autonomous Robotic Systems by Slava Gomzin
Cover of the book Business Continuity Management by Slava Gomzin
Cover of the book Intelligent Computing Theories and Application by Slava Gomzin
Cover of the book Word、Excel、PowerPoint精攻500招 by Slava Gomzin
Cover of the book The Photoshop Elements 11 Book for Digital Photographers by Slava Gomzin
Cover of the book Fire Safety of Historical Buildings by Slava Gomzin
Cover of the book Learning Apache Spark 2 by Slava Gomzin
Cover of the book OneNote For Beginners by Slava Gomzin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy