Skip to main content

Showing 1–5 of 5 results for author: Ohm, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.05897  [pdf, ps, other

    cs.CR cs.SE

    Exploring the Susceptibility to Fraud of Monetary Incentive Mechanisms for Strengthening FOSS Projects

    Authors: Ben Swierzy, Timo Pohl, Marc Ohm, Michael Meier

    Abstract: Free and open source software (FOSS) is ubiquitous on modern IT systems, accelerating the speed of software engineering over the past decades. With its increasing importance and historical reliance on uncompensated contributions, questions have been raised regarding the continuous maintenance of FOSS and its implications from a security perspective. In recent years, different funding programs have… ▽ More

    Submitted 9 May, 2025; originally announced May 2025.

    Comments: Accepted at ARES 2025

  2. arXiv:2503.21705  [pdf, other

    cs.SE cs.CR

    SoK: Towards Reproducibility for Software Packages in Scripting Language Ecosystems

    Authors: Timo Pohl, Pavel Novák, Marc Ohm, Michael Meier

    Abstract: The disconnect between distributed software artifacts and their supposed source code enables attackers to leverage the build process for inserting malicious functionality. Past research in this field focuses on compiled language ecosystems, mostly analysing Linux distribution packages. However, the popular scripting language ecosystems potentially face unique issues given the systematic difference… ▽ More

    Submitted 27 March, 2025; originally announced March 2025.

    Comments: 22 pages, 1 figure, submitted to ARES 2025

  3. You Can Run But You Can't Hide: Runtime Protection Against Malicious Package Updates For Node.js

    Authors: Marc Ohm, Timo Pohl, Felix Boes

    Abstract: Maliciously prepared software packages are an extensively leveraged weapon for software supply chain attacks. The detection of malicious packages is undoubtedly of high priority and many academic and commercial approaches have been developed. In the inevitable case of an attack, one needs resilience against malicious code. To this end, we present a runtime protection for Node.js that automatically… ▽ More

    Submitted 31 May, 2023; originally announced May 2023.

  4. arXiv:2011.02235  [pdf, other

    cs.CR

    Supporting the Detection of Software Supply Chain Attacks through Unsupervised Signature Generation

    Authors: Marc Ohm, Lukas Kempf, Felix Boes, Michael Meier

    Abstract: Trojanized software packages used in software supply chain attacks constitute an emerging threat. Unfortunately, there is still a lack of scalable approaches that allow automated and timely detection of malicious software packages and thus most detections are based on manual labor and expertise. However, it has been observed that most attack campaigns comprise multiple packages that share the same… ▽ More

    Submitted 19 March, 2021; v1 submitted 4 November, 2020; originally announced November 2020.

  5. arXiv:2005.09535  [pdf, other

    cs.CR cs.SE

    Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks

    Authors: Marc Ohm, Henrik Plate, Arnold Sykosch, Michael Meier

    Abstract: A software supply chain attack is characterized by the injection of malicious code into a software package in order to compromise dependent systems further down the chain. Recent years saw a number of supply chain attacks that leverage the increasing use of open source during software development, which is facilitated by dependency managers that automatically resolve, download and install hundreds… ▽ More

    Submitted 19 May, 2020; originally announced May 2020.

    Comments: This is a pre-print version of the paper that appears in the proceedings of The 17th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)