Research Directions in Software Supply Chain Security
ACM Transactions on Software Engineering and Methodology,
Journal Year:
2025,
Volume and Issue:
unknown
Published: Jan. 27, 2025
Reusable
software
libraries,
frameworks,
and
components,
such
as
those
provided
by
open-source
ecosystems
third-party
suppliers,
accelerate
digital
innovation.
However,
recent
years
have
shown
almost
exponential
growth
in
attackers
leveraging
these
artifacts
to
launch
supply
chain
attacks.
Past
well-known
attacks
include
the
SolarWinds,
log4j,
xz
utils
incidents.
Supply
are
considered
three
major
attack
vectors:
through
vulnerabilities
malware
accidentally
or
intentionally
injected
into
dependencies/components/containers
;
infiltrating
build
infrastructure
during
deployment
processes;
targeted
techniques
aimed
at
humans
involved
development,
social
engineering.
Plummeting
trust
could
decelerate
innovation
if
industry
reduces
its
use
of
reduce
risks.
This
paper
contains
perspectives
knowledge
obtained
from
intentional
outreach
with
practitioners
understand
their
practical
challenges
extensive
research
efforts.
We
then
provide
an
overview
current
efforts
secure
chain.
Finally,
we
propose
a
future
agenda
close
vectors
support
industry.
Language: Английский
An Empirical Study on Software Bill of Materials: Where We Stand and the Road Ahead
Published: May 1, 2023
The
rapid
growth
of
software
supply
chain
attacks
has
attracted
considerable
attention
to
bill
materials
(SBOM).
SBOMs
are
a
crucial
building
block
ensure
the
transparency
chains
that
helps
improve
security.
Although
there
significant
efforts
from
academia
and
industry
facilitate
SBOM
development,
it
is
still
unclear
how
practitioners
perceive
what
challenges
adopting
in
practice.
Furthermore,
existing
SBOM-related
studies
tend
be
ad-hoc
lack
engineering
focuses.
To
bridge
this
gap,
we
conducted
first
empirical
study
interview
survey
practitioners.
We
applied
mixed
qualitative
quantitative
method
for
gathering
data
17
interviewees
65
respondents
15
countries
across
five
continents
understand
field.
summarized
26
statements
grouped
them
into
three
topics
on
SBOM's
states
Based
results,
derived
goal
model
highlighted
future
directions
where
can
put
their
effort.
Language: Английский
It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security
2022 IEEE Symposium on Security and Privacy (SP),
Journal Year:
2023,
Volume and Issue:
unknown, P. 1527 - 1544
Published: May 1, 2023
The
2020
Solarwinds
attack
was
a
tipping
point
that
caused
heightened
awareness
about
the
security
of
software
supply
chain
and
in
particular
large
amount
trust
placed
build
systems.
Reproducible
Builds
(R-Bs)
provide
strong
foundation
to
defenses
for
arbitrary
attacks
against
systems
by
ensuring
given
same
source
code,
environment,
instructions,
bitwise-identical
artifacts
are
created.
Unfortunately,
much
industry
believes
R-Bs
too
far
out
reach
most
projects.
goal
this
paper
is
help
identify
path
become
commonplace
property.To
end,
we
conducted
series
24
semi-structured
expert
interviews
with
participants
from
Reproducible-Builds.org
project,
finding
self-effective
work
highly
motivated
developers
collaborative
communication
upstream
projects
key
contributors
R-Bs.
We
identified
range
motivations
can
encourage
open
strive
R-Bs,
including
indicators
quality,
benefits,
more
efficient
caching
artifacts.
also
experiences
hinder
adoption,
which
often
revolves
around
conclude
recommendations
on
how
better
integrate
efforts
free
community.
Language: Английский
On business adoption and use of reproducible builds for open and closed source software
Software Quality Journal,
Journal Year:
2022,
Volume and Issue:
31(3), P. 687 - 719
Published: Nov. 29, 2022
Abstract
Reproducible
builds
(R-Bs)
are
software
engineering
practices
that
reliably
create
bit-for-bit
identical
binary
executable
files
from
specified
source
code.
R-Bs
applied
in
some
open
(OSS)
projects
and
distributions
to
allow
verification
the
distributed
has
been
built
released
The
use
of
advocated
maintenance
development
OSS
security
applications.
Nonetheless,
industry
application
appears
limited,
we
seek
understand
whether
awareness
is
low
or
if
significant
technical
business
reasons
prevent
wider
adoption.
Through
interviews
with
practitioners
managers,
this
study
explores
utility
applying
businesses
primary
secondary
sectors
supporting
their
We
find
safety-critical
domains,
valuable
for
traceability
support
collaborative
development.
also
found
valued
as
processes
seen
a
badge
quality,
but
without
tangible
value
proposition.
There
good
industrial
development,
principle
establishing
correspondence
between
code
offers
opportunities
further
Language: Английский
Options Matter: Documenting and Fixing Non-Reproducible Builds in Highly-Configurable Systems
Published: April 15, 2024
Language: Английский
Debugging Unreproducible Builds using eBPF
V. K. Yadav,
No information about this author
Himanshu
No information about this author
Published: June 5, 2024
Language: Английский
Detecting Build Dependency Errors in Incremental Builds
Published: Sept. 11, 2024
AROMA: Automatic Reproduction of Maven Artifacts
Proceedings of the ACM on software engineering.,
Journal Year:
2024,
Volume and Issue:
1(FSE), P. 836 - 858
Published: July 12, 2024
Modern
software
engineering
establishes
supply
chains
and
relies
on
tools
libraries
to
improve
productivity.
However,
reusing
external
in
a
project
presents
security
risk
when
the
source
of
component
is
unknown
or
consistency
cannot
be
verified.
The
SolarWinds
attack
serves
as
popular
example
which
injection
malicious
code
into
library
affected
thousands
customers
caused
loss
billions
dollars.
Reproducible
builds
present
mitigation
strategy,
they
can
confirm
origin
reused
components.
A
large
reproducibility
community
has
formed
for
Debian,
but
Maven
ecosystem,
backbone
Java
chain,
remains
understudied
comparison.
Central
an
initiative
that
curates
list
reproducible
libraries,
limited
challenging
maintain
due
manual
efforts.
Our
research
aims
support
these
efforts
ecosystem
through
automation.
We
investigate
feasibility
automatically
finding
from
its
release
recovering
information
about
original
environment.
tool,
AROMA,
obtain
this
critical
artifact
repository
several
heuristics
we
use
results
reproduction
attempts
packages.
Overall,
our
approach
achieves
accuracy
up
99.5%
compared
field-by-field
existing
approach.
In
some
instances,
even
detected
flaws
manually
maintained
list,
such
broken
links.
reveal
automatic
feasible
23.4%
packages
using
8%
are
fully
reproducible.
demonstrate
ability
successfully
reproduce
new
have
contributed
them
repository.
Additionally,
highlight
actionable
insights,
outline
future
work
area,
make
dataset
available
public.
Language: Английский