Software supply chain: review of attacks, risk assessment strategies and security controls

B Gokkaya, L Aniello, B Halak - arXiv preprint arXiv:2305.14157, 2023 - arxiv.org
The software product is a source of cyber-attacks that target organizations by using their
software supply chain as a distribution vector. As the reliance of software projects on open …

Blocksense: Towards trustworthy mobile crowdsensing via proof-of-data blockchain

J Huang, L Kong, L Cheng, HN Dai… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Mobile crowdsensing (MCS) can promote data acquisition and sharing among mobile
devices. Traditional MCS platforms are based on a triangular structure consisting of three …

TEE-based decentralized recommender systems: The raw data sharing redemption

A Dhasade, N Dresevic… - 2022 IEEE …, 2022 - ieeexplore.ieee.org
Recommenders are central in many applications today. The most effective recommendation
schemes, such as those based on collaborative filtering (CF), exploit similarities between …

SoK: A Defense-Oriented Evaluation of Software Supply Chain Security

EA Ishgair, MS Melara, S Torres-Arias - arXiv preprint arXiv:2405.14993, 2024 - arxiv.org
The software supply chain comprises a highly complex set of operations, processes, tools,
institutions and human factors involved in creating a piece of software. A number of high …

Enabling Security-Oriented Orchestration of Microservices

MS Melara, M Bowman - arXiv preprint arXiv:2106.09841, 2021 - arxiv.org
As cloud providers push multi-tenancy to new levels to meet growing scalability demands,
ensuring that externally developed untrusted microservices will preserve tenant isolation …

Hardware-Enforced Integrity and Provenance for Distributed Code Deployments

MS Melara, M Bowman - arXiv preprint arXiv:2106.09843, 2021 - arxiv.org
Deployed microservices must adhere to a multitude of application-level security
requirements and regulatory constraints imposed by mutually distrusting application …

[PDF][PDF] Modelagem de Ameaças em Pipelines de Desenvolvimento de Software

BM Reichert - sistemabu.udesc.br
Em anos recentes tem crescido a preocupaçao com a integridade de software, ou seja, a
garantia de que o software nao seja adulterado no caminho entre desenvolvedores e …

[PDF][PDF] Analiza dinamicaa aplicat, iilor posibil malit, ioase

D Lucanu, VC Craciun - scdoc.info.uaic.ro
Evolut, ia rapidaa tehnologiilor din domeniul securitat, ii în ultimele doua decenii a permis
dezvoltatorilor de amenint, ari informatice sa îs, i dezvolte abilitat, ile s, i modul de operare …