You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
### DO NOT FORGET TO ADD YOUR NEW TAG &XXXXXX TO THE ENTRIES AT THE BOTTOM ###
1321
1335
### IF YOU FORGET, YOUR ENTRIES WILL NOT SHOW UP ON THE SITE! ###
1322
1336
1337
+
- &yelgundhalli_gittuf_ndss_2025
1338
+
anchor: yelgundhalli_gittuf_ndss_2025
1339
+
title: "Rethinking Trust in Forge-Based Git Security"
1340
+
authors:
1341
+
- name: "A.S.A. Yelgundhalli, P. Zielinski, R. Curtmola, J. Cappos"
1342
+
project: *gittuf
1343
+
booktitle: "Network and Distributed System Security Symposium 2025 (NDSS 2025)"
1344
+
year: "2025"
1345
+
pages: ""
1346
+
publisher: ""
1347
+
link: "/papers/yelgundhalli_gittuf_ndss_2025.pdf"
1348
+
abstract: "Git is the most popular version control system today, with Git forges such as GitHub, GitLab, and Bitbucket used to add functionality. Significantly, these forges are used to enforce security controls. However, due to the lack of an open protocol for ensuring a repository’s integrity, forges cannot prove themselves to be trustworthy, and have to carry the responsibility of being non-verifiable trusted third parties in modern software supply chains.
1349
+
1350
+
In this paper, we present gittuf, a system that decentralizes Git security and enables every user to contribute to collectively enforcing the repository’s security. First, gittuf enables distributing of policy declaration and management responsibilities among more parties such that no single user is trusted entirely or unilaterally. Second, gittuf decentralizes the tracking of repository activity, ensuring that a single entity cannot manipulate repository events. Third, gittuf decentralizes policy enforcement by enabling all developers to independently verify the policy, eliminating the single point of trust placed in the forge as the only arbiter for whether a change in the repository is authorized. Thus, gittuf can provide strong security guarantees in the event of a compromise of the centralized forge, the underlying infrastructure, or a subset of privileged developers trusted to set policy. gittuf also implements policy features that can protect against unauthorized changes to branches and tags (i.e., pushes) as well as files/folders (i.e., commits). Our analysis of gittuf shows that its properties and policy features provide protections against previously seen version control system attacks. In addition, our evaluation of gittuf shows it is viable even for large repositories with a high volume of activity such as those of Git and Kubernetes (less than 4% storage overhead and under 0.59s of time to verify each push).
1351
+
1352
+
Currently, gittuf is an OpenSSF sandbox project hosted by the Linux Foundation. gittuf is being used in projects hosted by the OpenSSF and the CNCF, and an enterprise pilot at Bloomberg is underway."
1353
+
1354
+
- &covsbom_issre_2024
1355
+
anchor: covsbom_issre_2024
1356
+
title: "CovSBOM: Enhancing Software Bill of Materials with Integrated Code Coverage Analysis"
1357
+
authors:
1358
+
- name: "Y. Zhao, Y. Zhang, D. Chacko, J. Cappos."
1359
+
project:
1360
+
booktitle: "The 35th IEEE International Symposium on Software Reliability Engineering (ISSRE 2024)"
1361
+
year: "2024"
1362
+
pages: ""
1363
+
publisher: ""
1364
+
link: "/papers/covsbom_issre_2024.pdf"
1365
+
abstract: "The widespread integration of open-source software into commercial codebases, government systems, and critical infrastructure presents significant security challenges, particularly due to the inclusion of vulnerable components. Software Bills of Materials (SBOMs) are crucial for tracking these components; however, they lack detailed insights into the actual utilization of each component, thereby limiting their effectiveness in vulnerability management. This paper introduces CovSBOM, a novel tool that integrates code coverage analysis into SBOMs to provide enhanced transparency and facilitate precise vulnerability detection. CovSBOM addresses the gap between current SBOM and security scanning tools by providing detailed insights into which parts of third-party libraries are actually being used, thereby reducing inefficiencies and the misallocation of developer resources caused by overemphasizing irrelevant vulnerabilities. Through a comprehensive evaluation of 23 large-scale applications, encompassing 1,614 dependencies and 145 vulnerability alerts, CovSBOM has demonstrated a significant reduction in false positives, accurately identifying 105 such instances. This improvement enhances the precision of vulnerability detection by approximately 72%, while effectively maintaining a reasonable level of scalability and usability."
- name: "M. Moore, A.S.A. Yelgundhalli, J. Cappos"
1372
+
project: *uptane
1373
+
booktitle: "Symposium on Vehicles Security and Privacy (VehicleSec) 2024"
1374
+
year: "2024"
1375
+
pages: ""
1376
+
publisher: ""
1377
+
link: "/papers/moore_scudo_vehiclesec_2024.pdf"
1378
+
abstract: "Software supply chain attacks are a major concern and need to be addressed by every organization, including automakers. While there are many effective technologies in both the software delivery and broader software supply chain security space, combining these technologies presents challenges specific to automotive applications. We explore the trust boundaries between the software supply chain and software delivery systems to determine where verification of software supply chain metadata should occur, how to establish a root of trust, and how supply chain policy can be distributed. Using this exploration, we design Scudo, a secure combination of software over the air and software supply chain security technologies. We show that adding full verification of software supply chain metadata on-vehicle is not only inefficient, but is also largely unnecessary for security with multiple points of repository-side verification.
1379
+
1380
+
In addition, this paper describes a secure instantiation of Scudo, which integrates Uptane, a state of the art software update security solution, and in-toto, a comprehensive supply chain security framework. A practical deployment has shown that Scudo provides robust software supply chain protections. The client side power and processing costs are negligible, with the updated metadata comprising 0.504% of the total update transmission. The client side verification adds 0.21 seconds to the total update flow. This demonstrates that Scudo is easy to deploy in ways that can efficiently and effectively catch software supply chain attacks."
0 commit comments