Star 0

Abstract

With “app store” business models, shiny new platform capabilities can be unleashed with simple enablement messages. But when locked features are valuable, platform attacks follow. Learn developer techniques for protecting platform features, building infrastructure for cryptographic authorization management and defending software clients from unauthorized upgrades.