Research directions in software supply chain security

L Williams, G Benedetti, S Hamer, R Paramitha… - ACM Transactions on …, 2024 - dl.acm.org
Reusable software libraries, frameworks, and components, such as those provided by open-
source ecosystems and third-party suppliers, accelerate digital innovation. However, recent …

On the way to sboms: Investigating design issues and solutions in practice

T Bi, B **a, Z **ng, Q Lu, L Zhu - ACM Transactions on Software …, 2024 - dl.acm.org
The increase of software supply chain threats has underscored the necessity for robust
security mechanisms, among which the Software Bill of Materials (SBOM) stands out as a …

Signing in four public software package registries: Quantity, quality, and influencing factors

TR Schorlemmer, KG Kalu, L Chigges… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Many software applications incorporate open-source third-party packages distributed by
public package registries. Guaranteeing authorship along this supply chain is a challenge …

Boms away! inside the minds of stakeholders: A comprehensive study of bills of materials for software systems

T Stalnaker, N Wintersgill, O Chaparro… - Proceedings of the 46th …, 2024 - dl.acm.org
Software Bills of Materials (SBOMs) have emerged as tools to facilitate the management of
software dependencies, vulnerabilities, licenses, and the supply chain. While significant …

Sbom generation tools under microscope: A focus on the npm ecosystem

MF Rabbi, AI Champa, C Nachuma… - Proceedings of the 39th …, 2024 - dl.acm.org
Generating accurate Software Bill of Materials (SBOM) is challenging due to the complex
dependencies in the diverse components used in software and also the way software is built …

Automatic specialization of third-party java dependencies

C Soto-Valero, D Tiwari, T Toady… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Large-scale code reuse significantly reduces both development costs and time. However,
the massive share of third-party code in software projects poses new challenges, especially …

SBOM. EXE: Countering Dynamic Code Injection based on Software Bill of Materials in Java

A Sharma, M Wittlinger, B Baudry… - arxiv preprint arxiv …, 2024 - arxiv.org
Software supply chain attacks have become a significant threat as software development
increasingly relies on contributions from multiple, often unverified sources. The code from …

Accuracy Evaluation of SBOM Tools for Web Applications and System-Level Software

A Halbritter, D Merli - Proceedings of the 19th International Conference …, 2024 - dl.acm.org
Recent vulnerabilities in software like Log4j raise the question whether the software supply
chain is secured sufficiently. Governmental initiatives in the United States (US) and the …

Java Bytecode Normalization for Code Similarity Analysis

S Schott, SE Ponta, W Fischer, J Klauke… - … Conference on Object …, 2024 - drops.dagstuhl.de
Analyzing the similarity of two code fragments has many applications, including code clone,
vulnerability and plagiarism detection. Most existing approaches for similarity analysis work …

Osmy: A Tool for Periodic Software Vulnerability Assessment and File Integrity Verification using SPDX Documents

R Kishimoto, T Kanda, Y Manabe… - … on Software Analysis …, 2024 - ieeexplore.ieee.org
Libraries have become integral to modern software development, yet their management
often falls short, resulting in issues such as delayed responses to vulnerabilities. To address …