Sok: Taxonomy of attacks on open-source software supply chains

P Ladisa, H Plate, M Martinez… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
The widespread dependency on open-source software makes it a fruitful target for malicious
actors, as demonstrated by recurring attacks. The complexity of today's open-source supply …

Research directions in software supply chain security

L Williams, G Benedetti, S Hamer, R Paramitha… - ACM Transactions on …, 2024 - dl.acm.org
Reusable software libraries, frameworks, and components, such as those provided by open-
source ecosystems and third-party suppliers, accelerate digital innovation. However, recent …

Software supply chain: review of attacks, risk assessment strategies and security controls

B Gokkaya, L Aniello, B Halak - arxiv preprint arxiv:2305.14157, 2023 - arxiv.org
The software product is a source of cyber-attacks that target organizations by using their
software supply chain as a distribution vector. As the reliance of software projects on open …

Taxonomy of attacks on open-source software supply chains

P Ladisa, H Plate, M Martinez, O Barais - arxiv preprint arxiv:2204.04008, 2022 - arxiv.org
The widespread dependency on open-source software makes it a fruitful target for malicious
actors, as demonstrated by recurring attacks. The complexity of today's open-source supply …

Preventing dynamic library compromise on node. js via rwx-based privilege reduction

N Vasilakis, CA Staicu, G Ntousakis, K Kallas… - Proceedings of the …, 2021 - dl.acm.org
Third-party libraries ease the development of large-scale software systems. However,
libraries often execute with significantly more privilege than needed to complete their task …

Precise and efficient patch presence test for android applications against code obfuscation

Z **e, M Wen, H Jia, X Guo, X Huang, D Zou… - Proceedings of the 32nd …, 2023 - dl.acm.org
Third-party libraries (TPLs) are widely utilized by Android developers to implement new
apps. Unfortunately, TPLs are often suffering from various vulnerabilities, which could be …

An empirical study on using large language models to analyze software supply chain security failures

T Singla, D Anandayuvaraj, KG Kalu… - Proceedings of the …, 2023 - dl.acm.org
As we increasingly depend on software systems, the consequences of breaches in the
software supply chain become more severe. High-profile cyber attacks like SolarWinds and …

Detecting third-party library problems with combined program analysis

G Ntousakis, S Ioannidis, N Vasilakis - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
Third-party libraries ease the software development process and thus have become an
integral part of modern software engineering. Unfortunately, they are not usually vetted by …

Skipfuzz: Active learning-based input selection for fuzzing deep learning libraries

HJ Kang, P Rattanukul, SA Haryono… - arxiv preprint arxiv …, 2022 - arxiv.org
Many modern software systems are enabled by deep learning libraries such as TensorFlow
and PyTorch. As deep learning is now prevalent, the security of deep learning libraries is a …

1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing

S Yang, Y He, K Chen, Z Ma, X Luo, Y **e… - Proceedings of the …, 2023 - dl.acm.org
1-day vulnerabilities are common in practice and have posed severe threats to end users, as
adversaries could learn from released patches to find them and exploit them. Reproducing 1 …