Software supply chain: review of attacks, risk assessment strategies and security controls
The software product is a source of cyber-attacks that target organizations by using their
software supply chain as a distribution vector. As the reliance of software projects on open …
software supply chain as a distribution vector. As the reliance of software projects on open …
Blocksense: Towards trustworthy mobile crowdsensing via proof-of-data blockchain
Mobile crowdsensing (MCS) can promote data acquisition and sharing among mobile
devices. Traditional MCS platforms are based on a triangular structure consisting of three …
devices. Traditional MCS platforms are based on a triangular structure consisting of three …
TEE-based decentralized recommender systems: The raw data sharing redemption
A Dhasade, N Dresevic… - 2022 IEEE …, 2022 - ieeexplore.ieee.org
Recommenders are central in many applications today. The most effective recommendation
schemes, such as those based on collaborative filtering (CF), exploit similarities between …
schemes, such as those based on collaborative filtering (CF), exploit similarities between …
SoK: A Defense-Oriented Evaluation of Software Supply Chain Security
EA Ishgair, MS Melara, S Torres-Arias - arXiv preprint arXiv:2405.14993, 2024 - arxiv.org
The software supply chain comprises a highly complex set of operations, processes, tools,
institutions and human factors involved in creating a piece of software. A number of high …
institutions and human factors involved in creating a piece of software. A number of high …
Enabling Security-Oriented Orchestration of Microservices
MS Melara, M Bowman - arXiv preprint arXiv:2106.09841, 2021 - arxiv.org
As cloud providers push multi-tenancy to new levels to meet growing scalability demands,
ensuring that externally developed untrusted microservices will preserve tenant isolation …
ensuring that externally developed untrusted microservices will preserve tenant isolation …
Hardware-Enforced Integrity and Provenance for Distributed Code Deployments
MS Melara, M Bowman - arXiv preprint arXiv:2106.09843, 2021 - arxiv.org
Deployed microservices must adhere to a multitude of application-level security
requirements and regulatory constraints imposed by mutually distrusting application …
requirements and regulatory constraints imposed by mutually distrusting application …
[PDF][PDF] Modelagem de Ameaças em Pipelines de Desenvolvimento de Software
BM Reichert - sistemabu.udesc.br
Em anos recentes tem crescido a preocupaçao com a integridade de software, ou seja, a
garantia de que o software nao seja adulterado no caminho entre desenvolvedores e …
garantia de que o software nao seja adulterado no caminho entre desenvolvedores e …
[PDF][PDF] Analiza dinamicaa aplicat, iilor posibil malit, ioase
D Lucanu, VC Craciun - scdoc.info.uaic.ro
Evolut, ia rapidaa tehnologiilor din domeniul securitat, ii în ultimele doua decenii a permis
dezvoltatorilor de amenint, ari informatice sa îs, i dezvolte abilitat, ile s, i modul de operare …
dezvoltatorilor de amenint, ari informatice sa îs, i dezvolte abilitat, ile s, i modul de operare …