How can you protect software from accepting updates from unauthorized sources?

Harriet CostaHarriet Costa Project Manager - Industrial Internet Consortium admin

How can you protect software from accepting updates from unauthorized sources?

Comments

  • Marcellus BuchheitMarcellus Buchheit President and CEO, Wibu-Systems USA

    The software update file must have a signed hash using a private key, known only by the software publisher. The software which accepts the update (probably to get updated itself) has a public key of this private key, being able to verify the signed hash. This prevents two issues: (1) the update is coming from a malicious source and (2) the update coming from the authentic source was maliciously modified on the way to the update location.

Sign In or Register to comment.