


default search action
SORED@CCS 2022: Los Angeles, CA, USA
- Santiago Torres-Arias, Marcela S. Melara, Laurent Simon:

Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, SCORED2022, Los Angeles, CA, USA, 7 November 2022. ACM 2022, ISBN 978-1-4503-9885-5 - Trevor Rosen:

Strength, Trust, and Harmony: The Challenges and Opportunities of Software Supply Chain Security. 1 - Andrew Ferraiuolo, Razieh Behjati

, Tiziano Santoro, Ben Laurie:
Policy Transparency: Authorization Logic Meets General Transparency to Prove Software Supply Chain Integrity. 3-13 - Chinenye Okafor

, Taylor R. Schorlemmer, Santiago Torres-Arias
, James C. Davis
:
SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties. 15-24 - Kaspar Rosager Ludvigsen, Shishir Nagaraja, Angela Daly

:
Preventing or Mitigating Adversarial Supply Chain Attacks: A Legal Analysis. 25-34 - Piergiorgio Ladisa

, Henrik Plate, Matias Martinez
, Olivier Barais, Serena Elisa Ponta:
Risk Explorer for Software Supply Chains: Understanding the Attack Surface of Open-Source based Software Development. 35-36 - Giacomo Benedetti

, Luca Verderame, Alessio Merlo:
Automatic Security Assessment of GitHub Actions Workflows. 37-45 - Joseph Hejderup:

On the Use of Tests for Software Supply Chain Threats. 47-49 - Frederick Barr-Smith, Tim Blazytko, Richard Baker, Ivan Martinovic:

Exorcist: Automated Differential Analysis to Detect Compromises in Closed-Source Software Supply Chains. 51-61 - Piergiorgio Ladisa

, Henrik Plate, Matias Martinez
, Olivier Barais, Serena Elisa Ponta:
Towards the Detection of Malicious Java Packages. 63-72 - Daniel Krohmer, Kunal Sharma

, Shi Chen:
Adapting Static Taint Analyzers to Software Marketplaces: A Leverage Point for Mass Vulnerability Detection? 73-82 - Nicholas Boucher

, Ross Anderson:
Talking Trojan: Analyzing an Industry-Wide Disclosure. 83-92 - Vijay Prakash, Sicheng Xie, Danny Yuxing Huang

:
Inferring Software Update Practices on Smart Home IoT Devices Through User Agent Analysis. 93-103 - Wenxin Jiang

, Nicholas Synovic
, Rohan Sethi, Aryan Indarapu, Matt Hyatt, Taylor R. Schorlemmer, George K. Thiruvathukal, James C. Davis
:
An Empirical Study of Artifacts and Security Risks in the Pre-trained Model Supply Chain. 105-114

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














