Ann, a software developer, wants to publish her newly developed software to an online store. Ann
wants to ensure that the software will not be modified by a third party or end users before being
installed on mobile devices. Which of the following should Ann implement to stop modified copies
of her software form running on mobile devices?
A.
Single sign-on
B.
Identity propagation
C.
Remote attestation
D.
Secure code review