Skip to main content

Showing 1–5 of 5 results for author: Ladisa, P

.
  1. On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI

    Authors: Piergiorgio Ladisa, Serena Elisa Ponta, Nicola Ronzoni, Matias Martinez, Olivier Barais

    Abstract: Current software supply chains heavily rely on open-source packages hosted in public repositories. Given the popularity of ecosystems like npm and PyPI, malicious users started to spread malware by publishing open-source packages containing malicious code. Recent works apply machine learning techniques to detect malicious packages in the npm ecosystem. However, the scarcity of samples poses a chal… ▽ More

    Submitted 14 October, 2023; originally announced October 2023.

    Comments: Proceedings of Annual Computer Security Applications Conference (ACSAC '23), December 4--8, 2023, Austin, TX, USA

  2. The Hitchhiker's Guide to Malicious Third-Party Dependencies

    Authors: Piergiorgio Ladisa, Merve Sahin, Serena Elisa Ponta, Marco Rosa, Matias Martinez, Olivier Barais

    Abstract: The increasing popularity of certain programming languages has spurred the creation of ecosystem-specific package repositories and package managers. Such repositories (e.g., npm, PyPI) serve as public databases that users can query to retrieve packages for various functionalities, whereas package managers automatically handle dependency resolution and package installation on the client side. These… ▽ More

    Submitted 6 October, 2023; v1 submitted 18 July, 2023; originally announced July 2023.

    Comments: Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses (SCORED '23), November 30, 2023, Copenhagen, Denmark

  3. arXiv:2304.05200  [pdf, other

    cs.CR cs.SE

    Journey to the Center of Software Supply Chain Attacks

    Authors: Piergiorgio Ladisa, Serena Elisa Ponta, Antonino Sabetta, Matias Martinez, Olivier Barais

    Abstract: This work discusses open-source software supply chain attacks and proposes a general taxonomy describing how attackers conduct them. We then provide a list of safeguards to mitigate such attacks. We present our tool "Risk Explorer for Software Supply Chains" to explore such information and we discuss its industrial use-cases.

    Submitted 11 April, 2023; originally announced April 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2204.04008

  4. arXiv:2210.03998  [pdf, other

    cs.CR

    Towards the Detection of Malicious Java Packages

    Authors: Piergiorgio Ladisa, Henrik Plate, Matias Martinez, Olivier Barais, Serena Elisa Ponta

    Abstract: Open-source software supply chain attacks aim at infecting downstream users by poisoning open-source packages. The common way of consuming such artifacts is through package repositories and the development of vetting strategies to detect such attacks is ongoing research. Despite its popularity, the Java ecosystem is the less explored one in the context of supply chain attacks. In this paper we p… ▽ More

    Submitted 8 October, 2022; originally announced October 2022.

  5. Taxonomy of Attacks on Open-Source Software Supply Chains

    Authors: Piergiorgio Ladisa, Henrik Plate, Matias Martinez, Olivier Barais

    Abstract: The widespread dependency on open-source software makes it a fruitful target for malicious actors, as demonstrated by recurring attacks. The complexity of today's open-source supply chains results in a significant attack surface, giving attackers numerous opportunities to reach the goal of injecting malicious code into open-source artifacts that is then downloaded and executed by victims. This w… ▽ More

    Submitted 19 April, 2022; v1 submitted 8 April, 2022; originally announced April 2022.

    Journal ref: 2023 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, US, 2023 pp. 1509-1526