Essays about: "Source Code Integrity"

Showing result 1 - 5 of 10 essays containing the words Source Code Integrity.

  1. 1. Decentralized Validation of Reproducible Builds : A protocol for collaborative and decentralized validation of package reproducibility

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Moritz; [2023]
    Keywords : Blockchain; Reproducible builds; Collaborative intelligence; Model checking; Hyperledger Fabric; TLA ; Blockkedjor; Reproducerbara byggen; Kollaborativ intelligens; Modeltestning; Hyperledger Fabric; TLA ;

    Abstract : As the threat of supply-chain attacks grows, the need for techniques to protect software integrity likewise increases. The concept of reproducible builds is one such protection. READ MORE

  2. 2. GitBark : A Rule-Based Framework for Maintaining Integrity in Source Code Repositories

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Elias Bonnici; [2023]
    Keywords : Source Code Integrity; Version Control System; Git; Threat modeling; Digital signatures; Källkodsintegritet; Versionshanteringssystem; Git; Hotmodellering; Digitala signaturer;

    Abstract : In today’s digital landscape, maintaining the integrity of source code is crucial for delivering reliable and trustworthy software solutions. However, the increasing prevalence of attacks targeting source code repositories and version control systems (VCSs) poses significant challenges to source code integrity. READ MORE

  3. 3. Throughput Analysis of Safepoint-attached Barriers in a Low-latency Garbage Collector : Analysis of a Compiler Optimization in the HotSpot JVM

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Filip Wilén; [2023]
    Keywords : Garbage Collection; Compiler; Java; JVM; Concurrency; Benchmarking; Skräpsamlare; Kompilatorer; Java; JVM; Multitrådat; Benchmarking;

    Abstract : When using managed programming languages, there is an essential benefit in having a fast and efficient compiler and garbage collector; one garbage collector currently under development is the HotSpot low-latency concurrent Generational Z Garbage Collector. Concurrent memory management runs application threads and garbage collection threads simultaneously. READ MORE

  4. 4. A Comparative Study Of Proof of Stake Algorithms

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Antonio Saaranen; [2022]
    Keywords : Blockchain; consensus algorithms; cryptography; Proof of Stake; Technology and Engineering;

    Abstract : Cryptocurrencies are growing at a rapid pace. It is well established that the mining operation fueling the cryptocurrency Bitcoin consumes a significant amount of energy. This study aims to determine if there is an alternative to the consensus model, maintaining security, integrity, and decentralization. READ MORE

  5. 5. Clean Code : Investigating Data Integrity and Non-Repudiation in the DevOps Platform GitLab

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : John Augustsson; Johan Carlsson; [2021]
    Keywords : GraphQL; Threat modeling; Open-Source Software; Ethical hacking; DevOps; GraphQL; Hotmodellering; Öppen källkod; Etisk hackning; DevOps;

    Abstract : Recent supply chain attacks on a larger scale in combination with a growing adoption of the set of automated software development and deployment practices commonly referred to as ’DevOps’, made us interested in the security of the underlying infrastructure supporting these practices. If a malicious commit in a piece of software can expose internal systems and networks of all users of said software to vulnerabilities, questions regarding trust and repudiation becomes central, in the platforms themselves as much as in each digitally signed software update version. READ MORE