2020
DOI: 10.1007/978-3-030-52683-2_2
|View full text |Cite
|
Sign up to set email alerts
|

Backstabber’s Knife Collection: A Review of Open Source Software Supply Chain Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
101
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 113 publications
(116 citation statements)
references
References 6 publications
0
101
0
Order By: Relevance
“…Known malicious examples. We used the malware dataset collected by Ohm et al [7]. The dataset contains 34 malicious artifacts of 23 packages that were collected for both real and research purpose attacks between November 2015 and November 2019.…”
Section: Preliminary Findingsmentioning
confidence: 99%
“…Known malicious examples. We used the malware dataset collected by Ohm et al [7]. The dataset contains 34 malicious artifacts of 23 packages that were collected for both real and research purpose attacks between November 2015 and November 2019.…”
Section: Preliminary Findingsmentioning
confidence: 99%
“…These attacks modify the targeted program so that it is still validly signed by its owner. The attacker simply injects his code into one of the software's dependencies [21]. Theoretically, an attacker can do this injection in any given node in the software's dependency tree.…”
Section: Software Supply-chain Attacksmentioning
confidence: 99%
“…Furthermore, if there is a vulnerability in one of the popular packages, then the issue will propagate through all the other libraries that depend on it. This concept is also known as software supply-chain security, which refers to outsiders accessing the final project [11,21]. Software supply-chain security is another research field but seems to be heavily related to OS registry security.…”
Section: Introductionmentioning
confidence: 99%
“…This build pipeline is frequently automated with continuous integration and deployment (CI/CD) tools like Jenkins and AWS CodeDeploy, which can automatically pull the latest versions of components from their source repositories, integrate them into the build environment, and deploy the final build -all within minutes or less. While instrumental in enabling the breakneck pace of development that users have come to expect, these highly-automated software supply chains can rapidly propagate the effects of human errors (e.g., accidental use of an outdated library) and have become attractive targets for bad actors looking to quietly insert backdoors, sabotage tools, and even cryptocurrency miners into otherwise-legitimate cloud software via third-party libraries or compromised compilers [2,14,17].…”
Section: Background and Related Workmentioning
confidence: 99%