Essays about: "Supply chain attacks"
Showing result 1 - 5 of 17 essays containing the words Supply chain attacks.
-
1. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. READ MORE
-
2. Diverse Double-Compiling to Harden Cryptocurrency Software
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : A trusting trust attack is a special case of a software supply-chain attack. The project in this report, named diverse double-compiling for cryptocurrency (DDC4CC), demonstrates and explains a defense for cryptocurrency software against trusting trust attacks. READ MORE
-
3. How to paint a picture : A discourse analysis of the media portrayal of hacker attacks against vital societal functions in Sweden
University essay from Uppsala universitet/Statsvetenskapliga institutionenAbstract : In our highly digitalized society, the dependence on digital solutions and systems is integral to the function of society. While digitalization has brought numerous benefits, it has also exposed society to vulnerabilities, making it susceptible to cyberattacks. READ MORE
-
4. Evaluating hardware isolation for secure software development in Highly Regulated Environments
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Organizations in highly regulated industries have an increasing need to protect their intellectual assets, because Advanced Persistent Threat (APT) entities are capable of using supply chain attacks to bypass traditional defenses. This work investigates the feasibility of preventing supply chain attacks by isolating the build environment of the software using hardware isolation. READ MORE
-
5. Decentralized Validation of Reproducible Builds : A protocol for collaborative and decentralized validation of package reproducibility
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As the threat of supply-chain attacks grows, the need for techniques to protect software integrity likewise increases. The concept of reproducible builds is one such protection. READ MORE