Submitted:
12 December 2024
Posted:
13 December 2024
Read the latest preprint version here
Abstract
Keywords:
1. Introduction
- *
- Description of a technique to examine used/potential components for vulnerabilities
- *
- Creation of a static code analysis technique to determine a dependency tree of components used
- *
- Development of a continuous verification system to enable organizations to make data-driven decisions based on component analysis
- *
- An automated systems architecture for vetting open-source applications before or after use
2. Materials and Methods
2.1. Dealing with Vulnerabilities in the Supply Chain
2.1.1. Potential and Current Vulnerabilities
2.1.2. Code Analysis for OSS Dependencies
2.1.3. Continuous Integration System
2.1.4. Incorporating Operations
3. Results
3.1. Vulnerabiity Assessments
3.2. Continuous Verification in Operations
- C1: checks the package for known vulnerabilities in a package’s dependencies and in the package itself.
- C2: checks the source code for known weaknesses in the code base using static code analysis, which leverages CWE information.
- C3: looks at the package’s community to understand the makeup of the project’s maintainers.
- C4: looks at the hygiene of the package.
- C5: is a policy that dictates that no open-source artifact will be included, which is not built by a trusted source.
- C6: is a network perimeter defense around the development and production environment of the software project.
4. Discussion
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Conflicts of Interest
References
- Townsend, K. Cyber Insights 2023 | Supply Chain Security. https://www.securityweek.com/cyber-insights-2023-supply-chain-security/, 2023.
- Fitri, A. Supply chain attacks on open source software grew 650% in 2021. https://techmonitor.ai/technology/cybersecurity/supply-chain-attacks-open-source-software-grew-650-percent-2021, 2021.
- Plumb, T. GitHub’s Octoverse report finds 97% of apps use open source software. https://venturebeat.com/programming-development/github-releases-open-source-report-octoverse-2022-says-97-of-apps-use-oss/, 2022.
- Microsoft. Github advisory database. url = https://github.com/advisories, 2023.
- Blog. Enable Dependabot, dependency graph, and other security features across your organization. https://github.blog/changelog/2020-07-13-enable-dependabot-dependency-graph-and-other-security-features-across-your-organization/, 2020.
- Snyk. Enable Dependabot, dependency graph, and other security features across your organization. url = https://docs.dependencytrack.org/datasources/snyk/, 2023.
- Pashchenko, I.; Vu, D.L.; Massacci, F. A Qualitative Study of Dependency Management and Its Security Implications. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security; Association for Computing Machinery: New York, NY, USA, 2020; CCS ’20, pp. 1513–1531. [CrossRef]
- Vailshery, L. Year-over-year (YoY) increase in open source software (OSS) supply chain attacks worldwide from 2020 to 2022. url = https://www.statista.com/statistics/1268934/worldwide-open-source-supply-chain-attacks/, 2023.
- Zahan, N.; Zimmermann, T.; Godefroid, P.; Murphy, B.; Maddila, C.; Williams, L. What are Weak Links in the npm Supply Chain? Proceedings of the 44th International Conference on Software Engineering: Software Engineering in Practice, 2022, pp. 331–340. arXiv:2112.10165 [cs]. [CrossRef]
- lmays. Security Scorecards for Open Source Projects, 2020.
- Malicious code found in npm package event-stream downloaded 8 million times in the past 2.5 months, 2018.
- Mitre. CNAs | CVE, 2023.
- Mitre. Overview | CVE, 2023.
- Mitre. CWE - About - CWE Overview, 2023.
- Swinhoe, D. 7 places to find threat intel beyond vulnerability databases. https://www.csoonline.com/article/3315619/7-places-to-find-threat-intel-beyond-vulnerability-databases.html, 2018.
- Urbanski, W. Day 0/Day 1/Day 2 operations & meaning - software lifecycle in the cloud age, 2021.
- vipul1501. Dependency Graph in Compiler Design, 2022. Section: Compiler Design.
- Vaszary, M. The EO and SBOMs: What your security team can do to prepare, 2023.
- NIST. attack surface - Glossary | CSRC, 2023.
- npm. vendorize, 2019.
- Hastings, T.; Walcott, K.R. Continuous Verification of Open Source Components in a World of Weak Links. 2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, 2022, pp. 201–207.
- Wang, X.; Sun, K.; Batcheller, A.; Jajodia, S. Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS. 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2019, pp. 485–492. ISSN: 1530-0889. [CrossRef]
- Idris Khan, F.; Javed, Y.; Alenezi, M. Security assessment of four open source software systems. Indonesian Journal of Electrical Engineering and Computer Science 2019, 16, 860. [CrossRef]
- Gkortzis, A.; Feitosa, D.; Spinellis, D. Software reuse cuts both ways: An empirical analysis of its relationship with security vulnerabilities. Journal of Systems and Software 2021, 172, 110653. [Google Scholar] [CrossRef]
- Ponta, S.E.; Plate, H.; Sabetta, A. Detection, assessment and mitigation of vulnerabilities in open source dependencies. Empirical Software Engineering 2020, 25, 3175–3215. [Google Scholar] [CrossRef]
- Pashchenko, I.; Plate, H.; Ponta, S.E.; Sabetta, A.; Massacci, F. Vuln4Real: A Methodology for Counting Actually Vulnerable Dependencies. IEEE Transactions on Software Engineering 2022, 48, 1592–1609, Conference Name: IEEE Transactions on Software Engineering. [Google Scholar] [CrossRef]
- Prana, G.A.A.; Sharma, A.; Shar, L.K.; Foo, D.; Santosa, A.E.; Sharma, A.; Lo, D. Out of sight, out of mind? How vulnerable dependencies affect open-source projects. Empirical Software Engineering 2021, 26, 59. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).