We propose a threat model that highlights three types of weaknesses in the code-signing PKI. We overcome challenges specific to code-signing measurements by ...
Nov 3, 2017 · In this paper, we conduct a systematic study of threats that breach the trust encoded in the Windows code-signing PKI. We focus on signed ...
Certified Malware: Measuring Breaches of Trust in The Windows Code-Signing PKI ... Digitally signed malware can bypass system protection mechanisms that install ...
This work proposes a threat model that highlights three types of weaknesses in the code-signing PKI and introduces techniques for prioritizing the ...
Request PDF | Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI | Digitally signed malware can bypass system protection ...
People also ask
What is code signing with PKI?
Which malware gains unauthorized access to a system by bypassing the normal authentication procedures?
In WEIS 2018: The Workshop on the Economics of Information Security. May 2018. Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI.
Nov 8, 2017 · The team published a research paper titled “Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI.” “Digitally signed ...
Oct 27, 2022 · Key findings. Checking the modules related to QAKBOT shows multiple samples that have been signed with multiple valid code signing certificates.
These techniques allow us to study threats that breach the trust encoded in the Windows code-signing PKI. The threats include stealing the private keys ...