Essays about: "Supply chain attacks"

Showing result 1 - 5 of 17 essays containing the words Supply chain attacks.

  1. 1. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Anvesh Ambala; [2024]
    Keywords : Supply chain; SBOM; Software Bill of Materials; US Executive Order May 2021; Open-Source Software; Vulnerability; cyber security.;

    Abstract : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. READ MORE

  2. 2. Diverse Double-Compiling to Harden Cryptocurrency Software

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Niklas Rosencrantz; [2023]
    Keywords : Trusting trust; Compiler security; Software Supply Chain; Trojan Horse; Cryptocurrency; Datasäkerhet; kompilator; datavirus; kryptovaluta; Trojansk häst;

    Abstract : A trusting trust attack is a special case of a software supply-chain attack. The project in this report, named diverse double-compiling for cryptocurrency (DDC4CC), demonstrates and explains a defense for cryptocurrency software against trusting trust attacks. READ MORE

  3. 3. How to paint a picture : A discourse analysis of the media portrayal of hacker attacks against vital societal functions in Sweden

    University essay from Uppsala universitet/Statsvetenskapliga institutionen

    Author : Viktoria Galyas; [2023]
    Keywords : cybersecurity; vital societal functions; critical infrastructure; New Public Management NPM ; outsourcing; privatization; Public Private Partnership PPP ; Digital Supply Chain DSC ; discourse; discourse analysis; discursive connections; Bacchi; Sweden;

    Abstract : In our highly digitalized society, the dependence on digital solutions and systems is integral to the function of society. While digitalization has brought numerous benefits, it has also exposed society to vulnerabilities, making it susceptible to cyberattacks. READ MORE

  4. 4. Evaluating hardware isolation for secure software development in Highly Regulated Environments

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Andre Brogärd; [2023]
    Keywords : Hardware Isolation; Supply chain attacks; HRE; Intel SGX; CI; Hårdvaruisolering; Distributionskedjeattacker; HRE; Intel SGX; CI;

    Abstract : Organizations in highly regulated industries have an increasing need to protect their intellectual assets, because Advanced Persistent Threat (APT) entities are capable of using supply chain attacks to bypass traditional defenses. This work investigates the feasibility of preventing supply chain attacks by isolating the build environment of the software using hardware isolation. READ MORE

  5. 5. Decentralized Validation of Reproducible Builds : A protocol for collaborative and decentralized validation of package reproducibility

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Moritz; [2023]
    Keywords : Blockchain; Reproducible builds; Collaborative intelligence; Model checking; Hyperledger Fabric; TLA ; Blockkedjor; Reproducerbara byggen; Kollaborativ intelligens; Modeltestning; Hyperledger Fabric; TLA ;

    Abstract : As the threat of supply-chain attacks grows, the need for techniques to protect software integrity likewise increases. The concept of reproducible builds is one such protection. READ MORE