2024
DOI: 10.1109/tdsc.2023.3253572
|View full text |Cite
|
Sign up to set email alerts
|

Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines

Abstract: The continuous integration and continuous deployment (CI/CD) pipelines are widely adopted on Internet hosting platforms, such as GitHub. However, current CI/CD pipelines suffer from malicious code and severe vulnerabilities. Even worse, people have not been fully aware of its attack surfaces and the corresponding impacts. Therefore, in this paper, we conduct a large-scale measurement and a systematic analysis to reveal the attack surfaces of the CI/CD pipeline and quantify their security impacts. Specifically,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 19 publications
0
0
0
Order By: Relevance
“…However, the paper is prescriptive and does not provide any reference implementation of how one might integrate these security measures. P. Kumar, V. K. Madisetti Journal of Software Engineering and Applications Pan et al [18], in their paper, "Ambush from All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines", conduct a large-scale measurement study of over 320 k CI/CD pipelines to define a threat model and approaches attackers may take towards these pipelines. They go on to validate the threat model with case studies.…”
Section: Related Workmentioning
confidence: 99%
“…However, the paper is prescriptive and does not provide any reference implementation of how one might integrate these security measures. P. Kumar, V. K. Madisetti Journal of Software Engineering and Applications Pan et al [18], in their paper, "Ambush from All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines", conduct a large-scale measurement study of over 320 k CI/CD pipelines to define a threat model and approaches attackers may take towards these pipelines. They go on to validate the threat model with case studies.…”
Section: Related Workmentioning
confidence: 99%