You Can Run But You Can't Hide: Runtime Protection Against Malicious Package Updates For Node.js

05/31/2023
by   Marc Ohm, et al.
0

Maliciously prepared software packages are an extensively leveraged weapon for software supply chain attacks. The detection of malicious packages is undoubtedly of high priority and many academic and commercial approaches have been developed. In the inevitable case of an attack, one needs resilience against malicious code. To this end, we present a runtime protection for Node.js that automatically limits a package's capabilities to an established minimum. The detection of required capabilities as well as their enforcement at runtime has been implemented and evaluated against known malicious attacks. Our approach was able to prevent 9/10 historic attacks with a median install-time overhead of less than 0.6 seconds and a median runtime overhead of less than 0.2 seconds.

READ FULL TEXT

page 5

page 7

research
02/28/2022

Practical Automated Detection of Malicious npm Packages

The npm registry is one of the pillars of the JavaScript and TypeScript ...
research
03/08/2021

Containing Malicious Package Updates in npm with a Lightweight Permission System

The large amount of third-party packages available in fast-moving softwa...
research
11/04/2020

If You've Seen One, You've Seen Them All: Leveraging AST Clustering Using MCL to Mimic Expertise to Detect Software Supply Chain Attacks

Trojanized software packages used in software supply chain attacks const...
research
02/17/2023

A Review of Attacks Against Language-Based Package Managers

The liberalization of software licensing has led to unprecedented re-use...
research
07/18/2023

The Hitchhiker's Guide to Malicious Third-Party Dependencies

The increasing popularity of certain programming languages has spurred t...
research
10/08/2022

Towards the Detection of Malicious Java Packages

Open-source software supply chain attacks aim at infecting downstream us...
research
06/16/2021

Loki: Hardening Code Obfuscation Against Automated Attacks

Software obfuscation is a crucial technology to protect intellectual pro...

Please sign up or login with your details

Forgot password? Click here to reset