A Review of Attacks Against Language-Based Package Managers

02/17/2023
by   Aarnav M. Bos, et al.
0

The liberalization of software licensing has led to unprecedented re-use of software. Alongside drastically increasing productivity and arguably quality of derivative works, it has also introduced multiple attack vectors. The management of software intended for re-use is typically conducted by a package manager, whose role involves installing and updating packages and enabling reproducible environments. Package managers implement various measures to enforce the integrity and accurate resolution of packages to prevent supply chain attacks. This review explores supply chain attacks on package managers. The attacks are categorized based on the nature of their impact and their position in the package installation process. To conclude, further areas of research are presented.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/19/2020

Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks

A software supply chain attack is characterized by the injection of mali...
research
12/19/2021

What are Weak Links in the npm Supply Chain?

Modern software development frequently uses third-party packages, raisin...
research
05/31/2023

You Can Run But You Can't Hide: Runtime Protection Against Malicious Package Updates For Node.js

Maliciously prepared software packages are an extensively leveraged weap...
research
10/11/2022

Software Supply Chain Attribute Integrity (SCAI)

The Software Supply Chain Attribute Integrity, or SCAI (pronounced "sky"...
research
08/30/2023

Quantitative Toolchain Assurance

The software bill of materials (SBOM) concept aims to include more infor...
research
10/31/2019

"multiColl": An R package to detect multicollinearity

This work presents a guide for the use of some of the functions of the R...
research
11/04/2020

If You've Seen One, You've Seen Them All: Leveraging AST Clustering Using MCL to Mimic Expertise to Detect Software Supply Chain Attacks

Trojanized software packages used in software supply chain attacks const...

Please sign up or login with your details

Forgot password? Click here to reset