2021
DOI: 10.48550/arxiv.2112.10165
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

What are Weak Links in the npm Supply Chain?

Nusrat Zahan,
Thomas Zimmermann,
Patrice Godefroid
et al.

Abstract: Modern software development frequently uses third-party packages, raising the concern of supply chain security attacks. Many attackers target popular package managers, like npm, and their users with supply chain attacks. In 2021 there was a 650% year-on-year growth in security attacks by exploiting Open Source Software's supply chain. Proactive approaches are needed to predict package vulnerability to high-risk supply chain attacks.The goal of this work is to help software developers and security specialists i… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…We collected the data for these three registries at the end of December 2021. For NPM, we use the dataset from [40] that was constructed in August 2021. While the download count can be inflated in different ways, including through CI/CD tooling, sampling the most downloaded packages to study a package ecosystem is an established approach [16,37] and provides an estimation of the most used packages in a registry.…”
Section: Package Selectionmentioning
confidence: 99%
See 3 more Smart Citations
“…We collected the data for these three registries at the end of December 2021. For NPM, we use the dataset from [40] that was constructed in August 2021. While the download count can be inflated in different ways, including through CI/CD tooling, sampling the most downloaded packages to study a package ecosystem is an established approach [16,37] and provides an estimation of the most used packages in a registry.…”
Section: Package Selectionmentioning
confidence: 99%
“…Supply chain security: Recent works have focused on the secure use of open source dependencies as part of the software supply chain [24,31,40,41]. Duan et al have proposed static and dynamic analysis approaches to detect malicious packages for the interpreted languages [19], while Sejfia et al have proposed machine learning models to detect malicious npm packages [33].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations