Sok: Taxonomy of attacks on open-source software supply chains

P Ladisa, H Plate, M Martinez… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
The widespread dependency on open-source software makes it a fruitful target for malicious
actors, as demonstrated by recurring attacks. The complexity of today's open-source supply …

[HTML][HTML] Mapping DevOps capabilities to the software life cycle: A systematic literature review

R Amaro, R Pereira, MM da Silva - Information and Software Technology, 2024 - Elsevier
Context: Many IT organizations are looking towards DevOps to make their software
development and delivery processes faster and more reliable, while DevOps revolutionized …

Taxonomy of attacks on open-source software supply chains

P Ladisa, H Plate, M Martinez, O Barais - arXiv preprint arXiv:2204.04008, 2022 - arxiv.org
The widespread dependency on open-source software makes it a fruitful target for malicious
actors, as demonstrated by recurring attacks. The complexity of today's open-source supply …

Characterizing the security of github {CI} workflows

I Koishybayev, A Nahapetyan, R Zachariah… - 31st USENIX Security …, 2022 - usenix.org
Continuous integration and deployment (CI/CD) has revolutionized software development
and maintenance. Commercial CI/CD platforms provide services for specifying and running …

Cloud-native application security: Risks, opportunities, and challenges in securing the evolving attack surface

M Chernyshev, Z Baig, S Zeadally - Computer, 2021 - ieeexplore.ieee.org
Insecure cloud-native applications (CNAs) will continue to experience security compromises
including data breaches due to their dynamic, complex, and varied threat landscape. We …

Continuous intrusion: Characterizing the security of continuous integration services

Y Gu, L Ying, H Chai, C Qiao, H Duan… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Continuous Integration (CI) is a widely-adopted software development practice for
automated code integration. A typical CI workflow involves multiple independent …

P2ISE: preserving project integrity in CI/CD based on secure elements

A Muñoz, A Farao, JRC Correia, C Xenakis - Information, 2021 - mdpi.com
During the past decade, software development has evolved from a rigid, linear process to a
highly automated and flexible one, thanks to the emergence of continuous integration and …

Toward Understanding the Security of Plugins in Continuous Integration Services

X Li, Y Gu, C Qiao, Z Zhang, D Liu, L Ying… - Proceedings of the …, 2024 - dl.acm.org
Mainstream Continuous Integration (CI) platforms have provided the plugin functionality to
accelerate the development of CI pipelines. Unfortunately, CI plugins, which are essentially …

When security meets velocity: Modeling continuous security for cloud applications using DevSecOps

R Kumar, R Goyal - … Technologies and Application: Proceedings of ICIDCA …, 2021 - Springer
In the quest of velocity in time-to-market for the cloud applications, often, the security
requirements are overlooked. It is mainly due to the preconceived notion that building …

Revolutionizing software developmental processes by utilizing continuous software approaches

HU Khan, W Afsar, S Nazir, A Noor, M Kundi… - The Journal of …, 2024 - Springer
The development of smart and innovative software applications in various disciplines has
inspired our lives by providing various cutting-edge technologies spanning from online to …