On the Feasibility of Detecting Software Supply Chain Attacks | IEEE Conference Publication | IEEE Xplore

On the Feasibility of Detecting Software Supply Chain Attacks


Abstract:

The Supply chain attack is the stealthy and sophisticated cyberattack that aims to compromise a target by exploiting weaknesses and vulnerabilities in its supply chain. R...Show More

Abstract:

The Supply chain attack is the stealthy and sophisticated cyberattack that aims to compromise a target by exploiting weaknesses and vulnerabilities in its supply chain. Recent supply chain attacks (e.g., SolarWinds attack) have compromised some of the most secured IT infrastructures of government agencies and enterprises. The European Union Agency for Cybersecurity, ENISA, has predicted that there will be 3 times more supply chain attacks in 2021 than in 2020. In this paper, we look into the problem of supply chain attacks, the challenges of defending software supply chain attacks. We analyze what it takes to effectively prevent software supply chain attacks, and show that it is indeed feasible and practical for the customers to detect certain software supply chain attacks. We propose an information flow based detection approach that enables end users to detect many software supply chain attacks without dealing with any of the underlying software suppliers.
Date of Conference: 29 November 2021 - 02 December 2021
Date Added to IEEE Xplore: 30 December 2021
ISBN Information:

ISSN Information:

Conference Location: San Diego, CA, USA

Contact IEEE to Subscribe

References

References is not available for this document.