Lastpymile: identifying the discrepancy between sources and packages

DL Vu, F Massacci, I Pashchenko, H Plate… - Proceedings of the 29th …, 2021 - dl.acm.org
Open source packages have source code available on repositories for inspection (eg on
GitHub) but developers use pre-built packages directly from the package repositories (such …

Towards detection of software supply chain attacks by forensic artifacts

M Ohm, A Sykosch, M Meier - … of the 15th international conference on …, 2020 - dl.acm.org
Third-party dependencies may introduce security risks to the software supply chain and
hence yield harm to their dependent software. There are many known cases of malicious …

Typosquatting and combosquatting attacks on the python ecosystem

DL Vu, I Pashchenko, F Massacci… - 2020 ieee european …, 2020 - ieeexplore.ieee.org
Limited automated controls integrated into the Python Package Index (PyPI) package
uploading process make PyPI an attractive target for attackers to trick developers into using …

Anomalicious: Automated detection of anomalous and potentially malicious commits on github

D Gonzalez, T Zimmermann… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
Security is critical to the adoption of open source software (OSS), yet few automated
solutions currently exist to help detect and prevent malicious contributions from infecting …

A survey on common threats in npm and pypi registries

B Kaplan, J Qian - Deployable Machine Learning for Security Defense …, 2021 - Springer
Software engineers regularly use JavaScript and Python for both front-end and back-end
automation tasks. On top of JavaScript and Python, there are several frameworks to facilitate …

Supporting the detection of software supply chain attacks through unsupervised signature generation

M Ohm, L Kempf, F Boes, M Meier - arXiv preprint arXiv:2011.02235, 2020 - arxiv.org
Trojanized software packages used in software supply chain attacks constitute an emerging
threat. Unfortunately, there is still a lack of scalable approaches that allow automated and …

OSSIntegrity: Collaborative open-source code integrity verification

M Nahum, E Grolman, I Maimon, D Mimran, O Brodt… - Computers & …, 2024 - Elsevier
Open-source software (OSS) libraries have become popular among developers due to their
ability to reduce development time and costs. However, OSS can also be exploited and used …

A method for identifying references between projects in github

B Liu, L Zhang, J Jiang, L Wang - Science of Computer Programming, 2022 - Elsevier
In open source software platforms, software projects do not usually develop in isolation, and
they depend on each other and develop together. It is important to identify references …

A Machine Learning-Based Approach For Detecting Malicious PyPI Packages

H Samaana, DE Costa, E Shihab… - arXiv preprint arXiv …, 2024 - arxiv.org
Background. In modern software development, the use of external libraries and packages is
increasingly prevalent, streamlining the software development process and enabling …

Leveraging Team Dynamics to Predict Open-source Software Projects' Susceptibility to Social Engineering Attacks

L Giovanini, D Oliveira, H Sanchez… - arXiv preprint arXiv …, 2021 - arxiv.org
Open-source software (OSS) is a critical part of the software supply chain. Recent social
engineering attacks against OSS development teams have enabled attackers to become …