Sok: Taxonomy of attacks on open-source software supply chains

P Ladisa, H Plate, M Martinez… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
The widespread dependency on open-source software makes it a fruitful target for malicious
actors, as demonstrated by recurring attacks. The complexity of today's open-source supply …

Empirical analysis of security vulnerabilities in python packages

M Alfadel, DE Costa, E Shihab - Empirical Software Engineering, 2023 - Springer
Software ecosystems play an important role in modern software development, providing an
open platform of reusable packages that speed up and facilitate development tasks …

Practical automated detection of malicious npm packages

A Sejfia, M Schäfer - Proceedings of the 44th International Conference …, 2022 - dl.acm.org
The npm registry is one of the pillars of the JavaScript and Type-Script ecosystems, hosting
over 1.7 million packages ranging from simple utility libraries to complex frameworks and …

Lastpymile: identifying the discrepancy between sources and packages

DL Vu, F Massacci, I Pashchenko, H Plate… - Proceedings of the 29th …, 2021 - dl.acm.org
Open source packages have source code available on repositories for inspection (eg on
GitHub) but developers use pre-built packages directly from the package repositories (such …

Software supply chain: review of attacks, risk assessment strategies and security controls

B Gokkaya, L Aniello, B Halak - arxiv preprint arxiv:2305.14157, 2023 - arxiv.org
The software product is a source of cyber-attacks that target organizations by using their
software supply chain as a distribution vector. As the reliance of software projects on open …

Towards using source code repositories to identify software supply chain attacks

DL Vu, I Pashchenko, F Massacci, H Plate… - Proceedings of the 2020 …, 2020 - dl.acm.org
Increasing popularity of third-party package repositories, like NPM, PyPI, or RubyGems,
makes them an attractive target for software supply chain attacks. By injecting malicious …

Maltracker: A fine-grained npm malware tracker copiloted by llm-enhanced dataset

Z Yu, M Wen, X Guo, H ** - Proceedings of the 33rd ACM SIGSOFT …, 2024 - dl.acm.org
As the largest package registry, Node Package Manager (NPM) has become the prime
target for various supply chain attacks recently and has been flooded with numerous …

Investigating package related security threats in software registries

Y Gu, L Ying, Y Pu, X Hu, H Chai… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Package registries host reusable code assets, allowing developers to share and reuse
packages easily, thus accelerating the software development process. Current software …

Software supply chain security: a systematic literature review

BM Reichert, RR Obelheiro - International Journal of Computers …, 2024 - Taylor & Francis
In recent years, software supply chain security has attracted significant research attention.
This research subject is concerned both with the security of infrastructures used to build …

Beyond typosquatting: an in-depth look at package confusion

S Neupane, G Holmes, E Wyss, D Davidson… - 32nd USENIX Security …, 2023 - usenix.org
Package confusion incidents-where a developer is misled into importing a package other
than the intended one-are one of the most severe issues in supply chain security with …