Demystifying the vulnerability propagation and its evolution via dependency trees in the npm ecosystem

C Liu, S Chen, L Fan, B Chen, Y Liu… - Proceedings of the 44th …, 2022 - dl.acm.org
Third-party libraries with rich functionalities facilitate the fast development of JavaScript
software, leading to the explosive growth of the NPM ecosystem. However, it also brings …

Practical automated detection of malicious npm packages

A Sejfia, M Schäfer - Proceedings of the 44th international conference …, 2022 - dl.acm.org
The npm registry is one of the pillars of the JavaScript and Type-Script ecosystems, hosting
over 1.7 million packages ranging from simple utility libraries to complex frameworks and …

Research directions in software supply chain security

L Williams, G Benedetti, S Hamer, R Paramitha… - ACM Transactions on …, 2024 - dl.acm.org
Reusable software libraries, frameworks, and components, such as those provided by open-
source ecosystems and third-party suppliers, accelerate digital innovation. However, recent …

On the impact of security vulnerabilities in the npm and RubyGems dependency networks

A Zerouali, T Mens, A Decan, C De Roover - Empirical Software …, 2022 - Springer
The increasing interest in open source software has led to the emergence of large language-
specific package distributions of reusable software libraries, such as npm and RubyGems …

Towards understanding third-party library dependency in c/c++ ecosystem

W Tang, Z Xu, C Liu, J Wu, S Yang, Y Li… - Proceedings of the 37th …, 2022 - dl.acm.org
Third-party libraries (TPLs) are frequently reused in software to reduce development cost
and the time to market. However, external library dependencies may introduce …

Challenges of producing software bill of materials for java

M Balliu, B Baudry, S Bobadilla, M Ekstedt… - IEEE Security & …, 2023 - ieeexplore.ieee.org
Software bills of materials (SBOMs) promise to become the backbone of software supply
chain hardening. We deep-dive into six tools and the SBOMs they produce for complex open …

On the use of dependabot security pull requests

M Alfadel, DE Costa, E Shihab… - 2021 IEEE/ACM 18th …, 2021 - ieeexplore.ieee.org
Vulnerable dependencies are a major problem in modern software development. As
software projects depend on multiple external dependencies, developers struggle to …

Software supply chain: review of attacks, risk assessment strategies and security controls

B Gokkaya, L Aniello, B Halak - arxiv preprint arxiv:2305.14157, 2023 - arxiv.org
The software product is a source of cyber-attacks that target organizations by using their
software supply chain as a distribution vector. As the reliance of software projects on open …

Circular systems engineering

I David, D Bork, G Kappel - Software and Systems Modeling, 2024 - Springer
The perception of the value and propriety of modern engineered systems is changing. In
addition to their functional and extra-functional properties, nowadays' systems are also …

Malicious package detection in NPM and pypi using a single model of malicious behavior sequence

J Zhang, K Huang, B Chen, C Wang, Z Tian… - arxiv preprint arxiv …, 2023 - arxiv.org
Open-source software (OSS) supply chain enlarges the attack surface, which makes
package registries attractive targets for attacks. Recently, package registries NPM and PyPI …