A Sharma, M Wittlinger, B Baudry… - arXiv preprint arXiv …, 2024 - arxiv.org
Software supply chain attacks have become a significant threat as software development increasingly relies on contributions from multiple, often unverified sources. The code from …
Modern software heavily relies on the use of components. Those components are usually published in central repositories, and managed by build systems via dependencies. Due to …
Analyzing the similarity of two code fragments has many applications, including code clone, vulnerability and plagiarism detection. Most existing approaches for similarity analysis work …
Incidents like xz and SolarWinds have led to an increased focus on software supply chain security. A particular concern is the detection and prevention of compromised builds. A …
In response to challenges in software supply chain security, several organisations have created infrastructures to independently build commodity open source projects and release …
ZT Tevaearai, F Toffalini - 2022 - hexhive.epfl.ch
Software can be built from source code or distributed as pre-compiled packages. These packages are the result of a software supply chain which can be subject to attacks or bugs …