Reusing deep learning models: Challenges and directions in software engineering

JC Davis, P Jajal, W Jiang… - 2023 IEEE John …, 2023 - ieeexplore.ieee.org
Deep neural networks (DNNs) achieve state-of-the-art performance in many areas, including
computer vision, system configuration, and question-answering. However, DNNs are …

Sok: Taxonomy of attacks on open-source software supply chains

P Ladisa, H Plate, M Martinez… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
The widespread dependency on open-source software makes it a fruitful target for malicious
actors, as demonstrated by recurring attacks. The complexity of today's open-source supply …

Sigstore: Software signing for everybody

Z Newman, JS Meyers, S Torres-Arias - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Software supply chain compromises are on the rise. From the effects of XCodeGhost to
SolarWinds, hackers have identified that targeting weak points in the supply chain allows …

Signing in four public software package registries: Quantity, quality, and influencing factors

TR Schorlemmer, KG Kalu, L Chigges… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Many software applications incorporate open-source third-party packages distributed by
public package registries. Guaranteeing authorship along this supply chain is a challenge …

Lastpymile: identifying the discrepancy between sources and packages

DL Vu, F Massacci, I Pashchenko, H Plate… - Proceedings of the 29th …, 2021 - dl.acm.org
Open source packages have source code available on repositories for inspection (eg on
GitHub) but developers use pre-built packages directly from the package repositories (such …

Software supply chain: review of attacks, risk assessment strategies and security controls

B Gokkaya, L Aniello, B Halak - arXiv preprint arXiv:2305.14157, 2023 - arxiv.org
The software product is a source of cyber-attacks that target organizations by using their
software supply chain as a distribution vector. As the reliance of software projects on open …

Taxonomy of attacks on open-source software supply chains

P Ladisa, H Plate, M Martinez, O Barais - arXiv preprint arXiv:2204.04008, 2022 - arxiv.org
The widespread dependency on open-source software makes it a fruitful target for malicious
actors, as demonstrated by recurring attacks. The complexity of today's open-source supply …

Sok: Analysis of software supply chain security by establishing secure design properties

C Okafor, TR Schorlemmer, S Torres-Arias… - Proceedings of the 2022 …, 2022 - dl.acm.org
This paper systematizes knowledge about secure software supply chain patterns. It identifies
four stages of a software supply chain attack and proposes three security properties crucial …

Does using Bazel help speed up continuous integration builds?

S Zheng, B Adams, AE Hassan - Empirical Software Engineering, 2024 - Springer
A long continuous integration (CI) build forces developers to wait for CI feedback before
starting subsequent development activities, leading to time wasted. In addition to a variety of …

It's like flossing your teeth: On the importance and challenges of reproducible builds for software supply chain security

M Fourné, D Wermke, W Enck, S Fahl… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
The 2020 Solarwinds attack was a tipping point that caused a heightened awareness about
the security of the software supply chain and in particular the large amount of trust placed in …