Description
Key Learnings
- Discover digital signature and public key infrastructure (PKI)
- Learn how to create and deploy a self-signed x509 certificate
- Learn how to sign the executable using the x509 certificate
- Learn how to determine the trusted plug-in from the trusted publisher dialog
Speakers
- GVGeorge VargheseGeorge Varghese has been with Autodesk, Inc., for over 15 years, working in the AutoCAD Group, and primarily in the AutoCAD Software Development Group. He worked on AutoCAD software features like Tool Palette, Table, Ribbon, and others. Lately, he has started working on the security features in AutoCAD software, dealing with digital signatures in AutoCAD software. He worked on the feature to be able to digitally sign lisp files. The lisp files are the primary threat vectors used by attackers to target AutoCAD software users. He worked on the “Trusted Publisher” feature that aides the user in discerning the plug-ins that come from a trusted source. He has given presentations on threat modeling to a number of internal Autodesk groups. He also gave a presentation on cryptographic algorithms and x.509 certificates to an internal Autodesk audience in an informal setting.
- DADavis AugustineDavis Augustine has been developing software since the early PC days and has been at Autodesk, Inc., in the AutoCAD Software Group since the R12 days. He has specialized at various times in graphics, database, file i/o, native C++, APIs, and performance. He has spent the past year or so on security issues.
- ESEileen SinnottEileen Sinnott was a programmer for many years at Autodesk, Inc., where she worked on the AutoCAD software product before becoming a software development manager. She manages a team of programmers who are developing features for the next release of AutoCAD software. Recently she has been focused on the security of the product and has presented in various venues, including at the 2013 Virus Bulletin Conference in Berlin and at internal technical summits.
No transcript