Taxonomy of Attacks on Open-Source Software Supply Chains

04/08/2022
by   Piergiorgio Ladisa, et al.
0

The widespread dependency on open-source software makes it a fruitful target for malicious actors, as demonstrated by recurring attacks. The complexity of today's open-source supply chains results in a significant attack surface, giving attackers numerous opportunities to reach the goal of injecting malicious code into open-source artifacts that is then downloaded and executed by victims. This work proposes a general taxonomy for attacks on open-source supply chains, independent of specific programming languages or ecosystems, and covering all supply chain stages from code contributions to package distribution. Taking the form of an attack tree, it covers 107 unique vectors, linked to 94 real-world incidents, and mapped to 33 mitigating safeguards. User surveys conducted with 17 domain experts and 134 software developers positively validated the correctness, comprehensiveness and comprehensibility of the taxonomy, as well as its suitability for various use-cases. Survey participants also assessed the utility and costs of the identified safeguards, and whether they are used.

READ FULL TEXT

page 4

page 7

page 11

research
04/11/2023

Journey to the Center of Software Supply Chain Attacks

This work discusses open-source software supply chain attacks and propos...
research
05/23/2023

Software supply chain: review of attacks, risk assessment strategies and security controls

The software product is a source of cyber-attacks that target organizati...
research
12/20/2022

Flareon: Stealthy any2any Backdoor Injection via Poisoned Augmentation

Open software supply chain attacks, once successful, can exact heavy cos...
research
07/29/2020

Return-Oriented Programming in RISC-V

RISC-V is an open-source hardware ISA based on the RISC design principle...
research
04/13/2021

Reproducible Builds: Increasing the Integrity of Software Supply Chains

Although it is possible to increase confidence in Free and Open Source S...
research
09/16/2022

Malicious Source Code Detection Using Transformer

Open source code is considered a common practice in modern software deve...
research
08/03/2022

Contrasting global approaches for identifying and managing cybersecurity risks in supply chains

Supply chains are increasingly targeted by threat actors. Using a recent...

Please sign up or login with your details

Forgot password? Click here to reset