Proceedings of the 9th International Symposium on Open Collaboration 2013
DOI: 10.1145/2491055.2491070
|View full text |Cite
|
Sign up to set email alerts
|

Security of public continuous integration services

Abstract: Continuous Integration (CI) and Free, Libre and Open Source Software (FLOSS) are both associated with agile software development. Contradictingly, FLOSS projects have difficulties to use CI and software forges still lack support for CI. Two factors hamper widespread use of CI in FLOSS development: Cost of the computational resources and security risks of public CI services. Through security analysis of public CI services, this paper identifies possible attack vectors. To eliminate one class of attack vectors, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 17 publications
0
12
0
Order By: Relevance
“…It has the feature of running in snapshot mode where no changes will be written back to the virtual hard drive. This gave us the advantage of always starting at the same filesystem state whenever conducting any of our automated tests [29].…”
Section: Qemu-kvmmentioning
confidence: 99%
“…It has the feature of running in snapshot mode where no changes will be written back to the virtual hard drive. This gave us the advantage of always starting at the same filesystem state whenever conducting any of our automated tests [29].…”
Section: Qemu-kvmmentioning
confidence: 99%
“…Assurance Case Analysis has been performed to verify that devised tactics fully address second and third security requirement of the CDP. (Gruhn et al, 2013) analyse CI from the security perspective to identify possible security threats. This study relates to our work as it also identifies a class of threats related to build server.…”
Section: Related Workmentioning
confidence: 99%
“…Utilizing VM plug-in in Jenkins protects VM from outside malicious access (Gruhn et al, 2013). Every time a Jenkins is asked to build, it fires up a VM with a Jenkins inside it.…”
Section: Clean CI Server Vm Imagementioning
confidence: 99%
See 1 more Smart Citation
“…Similarly to the latter work, lean GHTorrent provides elements of GITHUB. However, GITHUB is a repository of repositories [20] or meta repository [11] and, therefore, its elements are repositories themselves. Meta repositories, including lean GHTorrent, provide for cross-domain analysis [20].…”
Section: Related Workmentioning
confidence: 99%