Alice in (Software Supply) Chains: Risk Identification and Evaluation

被引:3
|
作者
Benedetti, Giacomo [1 ]
Verderame, Luca [1 ]
Merlo, Alessio [1 ]
机构
[1] Univ Genoa, DIBRIS, Genoa, Italy
关键词
Software supply chain; Software supply chain security; Risk identification; Software security;
D O I
10.1007/978-3-031-14179-9_19
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The fast pace of modern development paradigms like DevOps boosted the complexity of development pipelines. In particular, developers rely on many external assets and third-party software to build the final product and match the demanding requirements in terms of release cycles and functionalities. However, such a choice impacts all the elements of the development pipeline composing the so-called Software Supply Chain (SSC), degrading its maintainability and security. From a security standpoint, successful attacks can go unnoticed and impact many targets that use the affected software before being resolved. Unfortunately, traditional security assessment methodologies might detect the symptoms (e.g., the piece of vulnerable code) but not the cause, i.e., the attack vector and the affected asset of the SSC, failing to mitigate the risk of new attack campaigns. In this paper, we propose Sunset, a methodology with a two-fold objective. First, it allows the automatic reconnaissance of the SSC assets and dependencies to alleviate the burden of monitoring the composition of the SSC. Then, it computes a risk profile, identifying the SSC risk sources and how they can impact the final software to support the identification of the weakest points of the SSC and activate the necessary organizational and technical countermeasures to prevent future SSC attack campaigns.
引用
收藏
页码:281 / 295
页数:15
相关论文
共 50 条
  • [1] Software Supply Chains
    Defranco, Joanna F.
    Kshetri, Nir
    [J]. Computer, 2022, 55 (10): : 16 - 17
  • [2] Software Supply Chains
    Murphy, Gail C.
    [J]. 2015 ACM/IEEE 18TH INTERNATIONAL CONFERENCE ON MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS (MODELS), 2015, : 2 - 2
  • [3] A systematic evaluation of risk in bioenergy supply chains
    Axon, C. J.
    Darton, R. C.
    [J]. SUSTAINABLE PRODUCTION AND CONSUMPTION, 2024, 47 : 128 - 144
  • [4] Risk assessment in software supply chains using the Bayesian method
    Librantz, Andre Felipe Henriques
    Costa, Ivanir
    Spinola, Mauro de Mesquita
    de Oliveira Neto, Geraldo Cardoso
    Zerbinatti, Leandro
    [J]. INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2021, 59 (22) : 6758 - 6775
  • [5] A software application for rapid risk assessment in integrated supply chains
    Aqlan, Faisal
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2016, 43 : 109 - 116
  • [6] Empirical evaluation of the delivery risk of extended supply chains
    Inman, Robert R.
    Bhaskaran, Sita
    [J]. INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2019, 57 (11) : 3466 - 3477
  • [7] Identification and Evaluation of Supply Chain Fault Risk
    Li, Shouze
    Yu, Jianjun
    [J]. PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON OPERATIONS AND SUPPLY CHAIN MANAGEMENT (ICOSCM 2010), 2010, 4 : 832 - 835
  • [8] Risk and Resilience in Supply Chains
    Abramowicz, Daniel A.
    Karim, Shah
    [J]. RESEARCH-TECHNOLOGY MANAGEMENT, 2021, 64 (06) : 33 - 40
  • [9] Risk intermediation in supply chains
    Agrawal, V
    Seshadri, S
    [J]. IIE TRANSACTIONS, 2000, 32 (09) : 819 - 831
  • [10] RISK MANAGEMENT IN SUPPLY CHAINS
    Jakara, Martina
    Javni, Zlatko
    Skrinjar, Jasmina Pasagic
    [J]. INTERNATIONAL CONFERENCE ON TRAFFIC AND TRANSPORT ENGINEERING (ICTTE 2018), 2018, : 1090 - 1095