Skip to content

Commit 46f0b79

Browse files
committed
Add various papers, move Marina to alumni
Signed-off-by: Aditya Sirish <[email protected]>
1 parent 770d334 commit 46f0b79

File tree

5 files changed

+52
-6
lines changed

5 files changed

+52
-6
lines changed

_data/data.yml

Lines changed: 50 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,10 @@ people:
1515
photo: "img/people/justin_cappos.jpg"
1616
interests: "Solving real world security problems in practice"
1717
publications:
18+
- name: "NDSS 2025"
19+
link: "/papers/yelgundhalli_gittuf_ndss_2025.pdf"
1820
- name: "ACSAC 2023"
19-
link: "/paper/moore_artemis_2023.pdf"
21+
link: "/papers/moore_artemis_2023.pdf"
2022
- name: "USENIX Security 2019"
2123
link: "/papers/torres-toto-usenix19.pdf"
2224
- name: "AsiaCCS 2018"
@@ -386,6 +388,8 @@ people:
386388
photo: "img/people/marina_moore.jpg"
387389
interests: "Systems security, privacy"
388390
publications:
391+
- name: "VehicleSec 2024"
392+
link: "/papers/moore_scudo_vehiclesec_2024.pdf"
389393
- name: "ACSAC 2023"
390394
link: "/papers/moore_artemis_2023.pdf"
391395
- name: "ESCAR USA 2020 Special Issue"
@@ -413,14 +417,19 @@ people:
413417
deployments: <a href="https://github.com/alyptik/cepl/">CEPL</a>, an interactive C read-eval-print loop.
414418

415419
- &aditya_sirish
416-
name: "Aditya Sirish"
420+
name: "Aditya Sirish A Yelgundhalli"
417421
anchor: aditya_sirish
418422
internal: true
419423
role: "Ph.D. Candidate"
420424
since: 2019
421425
photo: "img/people/aditya_sirish.jpg"
422426
site: "https://saky.in/"
423427
interests: "Internet privacy, systems security"
428+
publications:
429+
- name: "NDSS 2025"
430+
link: "/papers/yelgundhalli_gittuf_ndss_2025.pdf"
431+
- name: "VehicleSec 2024"
432+
link: "/papers/moore_scudo_vehiclesec_2024.pdf"
424433

425434
- &sumana_harihareswara
426435
name: "Sumana Harihareswara"
@@ -709,6 +718,9 @@ people:
709718
since: 2024
710719
photo: "img/people/patrick_zielinski.jpg"
711720
interests: "Distributed systems, version control systems, and cryptography"
721+
publications:
722+
- name: "NDSS 2025"
723+
link: "/papers/yelgundhalli_gittuf_ndss_2025.pdf"
712724

713725
people_cards:
714726
- type: "Faculty"
@@ -724,7 +736,6 @@ people:
724736
- type: "PhD. Students"
725737
anchor: phd
726738
people:
727-
- *marina_moore
728739
- *nick_renner
729740
- *aditya_sirish
730741
- *prasant_adhikari
@@ -753,6 +764,7 @@ people:
753764
- type: Alumni
754765
anchor: alumni
755766
people:
767+
- *marina_moore
756768
- *lois_delong
757769
- *preston_moore
758770
- *yiwen_li
@@ -1320,19 +1332,51 @@ publications:
13201332
### DO NOT FORGET TO ADD YOUR NEW TAG &XXXXXX TO THE ENTRIES AT THE BOTTOM ###
13211333
### IF YOU FORGET, YOUR ENTRIES WILL NOT SHOW UP ON THE SITE! ###
13221334

1335+
- &yelgundhalli_gittuf_ndss_2025
1336+
anchor: yelgundhalli_gittuf_ndss_2025
1337+
title: "Rethinking Trust in Forge-Based Git Security"
1338+
authors:
1339+
- name: "A.S.A. Yelgundhalli, P. Zielinski, R. Curtmola, J. Cappos"
1340+
project: *gittuf
1341+
booktitle: "Network and Distributed System Security Symposium 2025 (NDSS 2025)"
1342+
year: "2025"
1343+
pages: ""
1344+
publisher: ""
1345+
link: "/papers/yelgundhalli_gittuf_ndss_2025.pdf"
1346+
abstract: "Git is the most popular version control system today, with Git forges such as GitHub, GitLab, and Bitbucket used to add functionality. Significantly, these forges are used to enforce security controls. However, due to the lack of an open protocol for ensuring a repository’s integrity, forges cannot prove themselves to be trustworthy, and have to carry the responsibility of being non-verifiable trusted third parties in modern software supply chains.
1347+
1348+
In this paper, we present gittuf, a system that decentralizes Git security and enables every user to contribute to collectively enforcing the repository’s security. First, gittuf enables distributing of policy declaration and management responsibilities among more parties such that no single user is trusted entirely or unilaterally. Second, gittuf decentralizes the tracking of repository activity, ensuring that a single entity cannot manipulate repository events. Third, gittuf decentralizes policy enforcement by enabling all developers to independently verify the policy, eliminating the single point of trust placed in the forge as the only arbiter for whether a change in the repository is authorized. Thus, gittuf can provide strong security guarantees in the event of a compromise of the centralized forge, the underlying infrastructure, or a subset of privileged developers trusted to set policy. gittuf also implements policy features that can protect against unauthorized changes to branches and tags (i.e., pushes) as well as files/folders (i.e., commits). Our analysis of gittuf shows that its properties and policy features provide protections against previously seen version control system attacks. In addition, our evaluation of gittuf shows it is viable even for large repositories with a high volume of activity such as those of Git and Kubernetes (less than 4% storage overhead and under 0.59s of time to verify each push).
1349+
1350+
Currently, gittuf is an OpenSSF sandbox project hosted by the Linux Foundation. gittuf is being used in projects hosted by the OpenSSF and the CNCF, and an enterprise pilot at Bloomberg is underway."
1351+
13231352
- &covsbom_issre_2024
13241353
anchor: covsbom_issre_2024
13251354
title: "CovSBOM: Enhancing Software Bill of Materials with Integrated Code Coverage Analysis"
13261355
authors:
13271356
- name: "Y. Zhao, Y. Zhang, D. Chacko, J. Cappos."
13281357
project:
1329-
booktitle: "The 35th IEEE International Symposium on Software Reliability Engineering (ISSRE 2023)"
1358+
booktitle: "The 35th IEEE International Symposium on Software Reliability Engineering (ISSRE 2024)"
13301359
year: "2024"
13311360
pages: ""
13321361
publisher: ""
13331362
link: "/papers/covsbom_issre_2024.pdf"
13341363
abstract: "The widespread integration of open-source software into commercial codebases, government systems, and critical infrastructure presents significant security challenges, particularly due to the inclusion of vulnerable components. Software Bills of Materials (SBOMs) are crucial for tracking these components; however, they lack detailed insights into the actual utilization of each component, thereby limiting their effectiveness in vulnerability management. This paper introduces CovSBOM, a novel tool that integrates code coverage analysis into SBOMs to provide enhanced transparency and facilitate precise vulnerability detection. CovSBOM addresses the gap between current SBOM and security scanning tools by providing detailed insights into which parts of third-party libraries are actually being used, thereby reducing inefficiencies and the misallocation of developer resources caused by overemphasizing irrelevant vulnerabilities. Through a comprehensive evaluation of 23 large-scale applications, encompassing 1,614 dependencies and 145 vulnerability alerts, CovSBOM has demonstrated a significant reduction in false positives, accurately identifying 105 such instances. This improvement enhances the precision of vulnerability detection by approximately 72%, while effectively maintaining a reasonable level of scalability and usability."
13351364

1365+
- &moore_scudo_vehiclesec_2024
1366+
anchor: moore_scudo_vehiclesec_2024
1367+
title: "Securing Automotive Software Supply Chains"
1368+
authors:
1369+
- name: "M. Moore, A.S.A. Yelgundhalli, J. Cappos"
1370+
project: *uptane
1371+
booktitle: "Symposium on Vehicles Security and Privacy (VehicleSec) 2024"
1372+
year: "2024"
1373+
pages: ""
1374+
publisher: ""
1375+
link: "/papers/moore_scudo_vehiclesec_2024.pdf"
1376+
abstract: "Software supply chain attacks are a major concern and need to be addressed by every organization, including automakers. While there are many effective technologies in both the software delivery and broader software supply chain security space, combining these technologies presents challenges specific to automotive applications. We explore the trust boundaries between the software supply chain and software delivery systems to determine where verification of software supply chain metadata should occur, how to establish a root of trust, and how supply chain policy can be distributed. Using this exploration, we design Scudo, a secure combination of software over the air and software supply chain security technologies. We show that adding full verification of software supply chain metadata on-vehicle is not only inefficient, but is also largely unnecessary for security with multiple points of repository-side verification.
1377+
1378+
In addition, this paper describes a secure instantiation of Scudo, which integrates Uptane, a state of the art software update security solution, and in-toto, a comprehensive supply chain security framework. A practical deployment has shown that Scudo provides robust software supply chain protections. The client side power and processing costs are negligible, with the updated metadata comprising 0.504% of the total update transmission. The client side verification adds 0.21 seconds to the total update flow. This demonstrates that Scudo is easy to deploy in ways that can efficiently and effectively catch software supply chain attacks."
1379+
13361380
- &moore_artemis_2023
13371381
anchor: moore_artemis_2023
13381382
title: "Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems"
@@ -2967,6 +3011,7 @@ and the Debian popularity contest. Our tests found a total of 63 bugs in 31 appl
29673011
- type: Conference Papers
29683012
anchor: conference
29693013
publications:
3014+
- *yelgundhalli_gittuf_ndss_2025
29703015
- *covsbom_issre_2024
29713016
- *moore_artemis_2023
29723017
- *moore_port_icsoft_2022
@@ -3011,6 +3056,7 @@ and the Debian popularity contest. Our tests found a total of 63 bugs in 31 appl
30113056
- type: Workshop Papers
30123057
anchor: workshop
30133058
publications:
3059+
- *moore_scudo_vehiclesec_2024
30143060
- *almashaqbeh_ABC_cryblock_19
30153061
- *zhuang_sensibility_HotMobile_18
30163062
- *cappos_nspw_2014
462 KB
Binary file not shown.

personalpages/jcappos/fullpublications.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ <h1 ><a href="index.htm">Prof. Justin Cappos</a></h1>
7474
<h2>Conference Papers</h2>
7575

7676
<p><strong>"Rethinking Trust in Forge-Based Git Security"</strong>
77-
<a href="/papers/yelgundhalli_gittuf_ndss_2024.pdf">PDF</a><br/>
77+
<a href="/papers/yelgundhalli_gittuf_ndss_2025.pdf">PDF</a><br/>
7878
A. Yelgundhalli, P. Zielinski, R. Curtmola, J. Cappos. <br/>
7979
To appear at the <em>Network and Distributed System Security (NDSS) Symposium
8080
2025 (NDSS 2025).</em><br/>

personalpages/jcappos/publications.htm

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ <h2>Selected Conference Papers</h2>
7878

7979

8080
<p><strong>"Rethinking Trust in Forge-Based Git Security"</strong>
81-
<a href="/papers/yelgundhalli_gittuf_ndss_2024.pdf">PDF</a><br/>
81+
<a href="/papers/yelgundhalli_gittuf_ndss_2025.pdf">PDF</a><br/>
8282
A. Yelgundhalli, P. Zielinski, R. Curtmola, J. Cappos. <br/>
8383
To appear at the <em>Network and Distributed System Security (NDSS) Symposium
8484
2025 (NDSS 2025).</em><br/>

0 commit comments

Comments
 (0)