Sok: Taxonomy of attacks on open-source software supply chains

P Ladisa, H Plate, M Martinez… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
The widespread dependency on open-source software makes it a fruitful target for malicious
actors, as demonstrated by recurring attacks. The complexity of today's open-source supply …

Kee** authorities" honest or bust" with decentralized witness cosigning

E Syta, I Tamas, D Visher, DI Wolinsky… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
The secret keys of critical network authorities--such as time, name, certificate, and software
update services--represent high-value targets for hackers, criminals, and spy agencies …

Towards measuring supply chain attacks on package managers for interpreted languages

R Duan, O Alrawi, RP Kasturi, R Elder… - arxiv preprint arxiv …, 2020 - arxiv.org
Package managers have become a vital part of the modern software development process.
They allow developers to reuse third-party code, share their own code, minimize their …

The state‐of‐the‐art in container technologies: Application, orchestration and security

E Casalicchio, S Iannucci - Concurrency and Computation …, 2020 - Wiley Online Library
Containerization is a lightweight virtualization technology enabling the deployment and
execution of distributed applications on cloud, edge/fog, and Internet‐of‐Things platforms …

Sigstore: Software signing for everybody

Z Newman, JS Meyers, S Torres-Arias - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Software supply chain compromises are on the rise. From the effects of XCodeGhost to
SolarWinds, hackers have identified that targeting weak points in the supply chain allows …

{CHAINIAC}: Proactive {Software-Update} transparency via collectively signed skipchains and verified builds

K Nikitin, E Kokoris-Kogias, P Jovanovic… - 26th USENIX Security …, 2017 - usenix.org
Software-update mechanisms are critical to the security of modern systems, but their
typically centralized design presents a lucrative and frequently attacked target. In this work …

Signing in four public software package registries: Quantity, quality, and influencing factors

TR Schorlemmer, KG Kalu, L Chigges… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Many software applications incorporate open-source third-party packages distributed by
public package registries. Guaranteeing authorship along this supply chain is a challenge …

Software supply chain: review of attacks, risk assessment strategies and security controls

B Gokkaya, L Aniello, B Halak - arxiv preprint arxiv:2305.14157, 2023 - arxiv.org
The software product is a source of cyber-attacks that target organizations by using their
software supply chain as a distribution vector. As the reliance of software projects on open …

Taxonomy of attacks on open-source software supply chains

P Ladisa, H Plate, M Martinez, O Barais - arxiv preprint arxiv:2204.04008, 2022 - arxiv.org
The widespread dependency on open-source software makes it a fruitful target for malicious
actors, as demonstrated by recurring attacks. The complexity of today's open-source supply …

[HTML][HTML] eUF: A framework for detecting over-the-air malicious updates in autonomous vehicles

A Qureshi, M Marvi, JA Shamsi, A Aijaz - Journal of King Saud University …, 2022 - Elsevier
Software updates are highly significant in autonomous vehicles. These updates are utilized
to provide enhanced features and updated security mechanisms. In order to ensure …