Proceedings of the 15th International Conference on Availability, Reliability and Security 2020
DOI: 10.1145/3407023.3409183
|View full text |Cite
|
Sign up to set email alerts
|

Towards detection of software supply chain attacks by forensic artifacts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 35 publications
(19 citation statements)
references
References 2 publications
0
17
0
Order By: Relevance
“…Originates from within the organization by legitimate users, e.g., employees, to misuse access to networks and assets [30] Supply chain attack Targets less secure supply network components to harm any industry, from the financial sector, oil or government sector [31,32] Man-in-the-middle (MiiM) A type of cyberattack in which a malicious actor introduces himself into a two-party conversation to gain access to sensitive information [33] Data breaches Known as a data leakage, a theft of data by a malicious actor, e.g., unauthorized access of data by an individual, application, or service [34,35] Hacking To compromise data and digital devices, such as computers, smartphones, tablets, and even entire networks [26,36] SQL injection attack To execute malicious SQL statements for backend database manipulation to access information, typically used to attack data-driven applications [37] Attacks on IoT devices To make it part of a DDoS attack and unauthorized access to data being collected by the device […”
Section: Insider Threatsmentioning
confidence: 99%
“…Originates from within the organization by legitimate users, e.g., employees, to misuse access to networks and assets [30] Supply chain attack Targets less secure supply network components to harm any industry, from the financial sector, oil or government sector [31,32] Man-in-the-middle (MiiM) A type of cyberattack in which a malicious actor introduces himself into a two-party conversation to gain access to sensitive information [33] Data breaches Known as a data leakage, a theft of data by a malicious actor, e.g., unauthorized access of data by an individual, application, or service [34,35] Hacking To compromise data and digital devices, such as computers, smartphones, tablets, and even entire networks [26,36] SQL injection attack To execute malicious SQL statements for backend database manipulation to access information, typically used to attack data-driven applications [37] Attacks on IoT devices To make it part of a DDoS attack and unauthorized access to data being collected by the device […”
Section: Insider Threatsmentioning
confidence: 99%
“…This problem likely happens due to the lack of an efficient mechanism for checking malicious code injections in FOSS packages uploaded to the package repositories at a high pace (400 and 100 new packages are uploaded to npm and PyPI, respectively every day [10]). Current malware detection techniques in language based ecosystems, on the other hand, are resource demanding [1], require prior knowledge of previously benign releases [8], or unable to process packages that have a limited number of published releases [2].…”
Section: Introductionmentioning
confidence: 99%
“…Ohm et al [8] proposed Buildwatch, a framework for dynamic analysis of software and its third-party dependencies. The authors observed a high number of activities related to files (e.g., files written operations) in malicous verisons compared to the benign versions that were previously released of the analyzed packages.…”
Section: Introductionmentioning
confidence: 99%
“…There has been work in the field to efficiently automate the detection of malicious code injection in the distributed artifacts of packages, and the admins may attempt to implement some of these novel tools [34]. One such tool, named Buildwatch, analyzes the third-party dependencies by using the simple assumption that malicious packages introduce more artifacts during installation than benign libraries [22]. This hypothesis has been formulated and tested in the Buildwatch study [22].…”
Section: Suggested Countermeasuresmentioning
confidence: 99%
“…One such tool, named Buildwatch, analyzes the third-party dependencies by using the simple assumption that malicious packages introduce more artifacts during installation than benign libraries [22]. This hypothesis has been formulated and tested in the Buildwatch study [22]. Admins can also modify Buildwatch to detect squat-ting packages in the dependency tree with the techniques we will discuss in the upcoming sections.…”
Section: Suggested Countermeasuresmentioning
confidence: 99%