


default search action
SORED@CCS 2022: Los Angeles, CA, USA
- Santiago Torres-Arias, Marcela S. Melara, Laurent Simon:
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, SCORED2022, Los Angeles, CA, USA, 7 November 2022. ACM 2022, ISBN 978-1-4503-9885-5 - Trevor Rosen:
Strength, Trust, and Harmony: The Challenges and Opportunities of Software Supply Chain Security. 1 - Andrew Ferraiuolo, Razieh Behjati
, Tiziano Santoro, Ben Laurie:
Policy Transparency: Authorization Logic Meets General Transparency to Prove Software Supply Chain Integrity. 3-13 - Chinenye Okafor, Taylor R. Schorlemmer, Santiago Torres-Arias
, James C. Davis
:
SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties. 15-24 - Kaspar Rosager Ludvigsen, Shishir Nagaraja, Angela Daly
:
Preventing or Mitigating Adversarial Supply Chain Attacks: A Legal Analysis. 25-34 - Piergiorgio Ladisa
, Henrik Plate, Matias Martinez, Olivier Barais, Serena Elisa Ponta:
Risk Explorer for Software Supply Chains: Understanding the Attack Surface of Open-Source based Software Development. 35-36 - Giacomo Benedetti
, Luca Verderame, Alessio Merlo:
Automatic Security Assessment of GitHub Actions Workflows. 37-45 - Joseph Hejderup:
On the Use of Tests for Software Supply Chain Threats. 47-49 - Frederick Barr-Smith, Tim Blazytko, Richard Baker, Ivan Martinovic:
Exorcist: Automated Differential Analysis to Detect Compromises in Closed-Source Software Supply Chains. 51-61 - Piergiorgio Ladisa
, Henrik Plate, Matias Martinez, Olivier Barais, Serena Elisa Ponta:
Towards the Detection of Malicious Java Packages. 63-72 - Daniel Krohmer, Kunal Sharma
, Shi Chen:
Adapting Static Taint Analyzers to Software Marketplaces: A Leverage Point for Mass Vulnerability Detection? 73-82 - Nicholas Boucher
, Ross Anderson:
Talking Trojan: Analyzing an Industry-Wide Disclosure. 83-92 - Vijay Prakash, Sicheng Xie, Danny Yuxing Huang
:
Inferring Software Update Practices on Smart Home IoT Devices Through User Agent Analysis. 93-103 - Wenxin Jiang
, Nicholas Synovic, Rohan Sethi, Aryan Indarapu, Matt Hyatt, Taylor R. Schorlemmer, George K. Thiruvathukal, James C. Davis
:
An Empirical Study of Artifacts and Security Risks in the Pre-trained Model Supply Chain. 105-114

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.