Skip to content

Commit e0843e9

Browse files
committed
Add various papers, move Marina to alumni
Signed-off-by: Aditya Sirish <[email protected]>
1 parent ff25ef6 commit e0843e9

File tree

1 file changed

+43
-4
lines changed

1 file changed

+43
-4
lines changed

_data/data.yml

Lines changed: 43 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,10 @@ people:
1515
photo: "img/people/justin_cappos.jpg"
1616
interests: "Solving real world security problems in practice"
1717
publications:
18+
- name: "NDSS 2025"
19+
link: "/papers/yelgundhalli_gittuf_ndss_2025.pdf"
1820
- name: "ACSAC 2023"
19-
link: "/paper/moore_artemis_2023.pdf"
21+
link: "/papers/moore_artemis_2023.pdf"
2022
- name: "USENIX Security 2019"
2123
link: "/papers/torres-toto-usenix19.pdf"
2224
- name: "AsiaCCS 2018"
@@ -415,7 +417,7 @@ people:
415417
deployments: <a href="https://github.com/alyptik/cepl/">CEPL</a>, an interactive C read-eval-print loop.
416418

417419
- &aditya_sirish
418-
name: "Aditya Sirish"
420+
name: "Aditya Sirish A Yelgundhalli"
419421
anchor: aditya_sirish
420422
internal: true
421423
role: "Ph.D. Candidate"
@@ -716,6 +718,9 @@ people:
716718
since: 2024
717719
photo: "img/people/patrick_zielinski.jpg"
718720
interests: "Distributed systems, version control systems, and cryptography"
721+
publications:
722+
- name: "NDSS 2025"
723+
link: "/papers/yelgundhalli_gittuf_ndss_2025.pdf"
719724

720725
people_cards:
721726
- type: "Faculty"
@@ -731,7 +736,6 @@ people:
731736
- type: "PhD. Students"
732737
anchor: phd
733738
people:
734-
- *marina_moore
735739
- *nick_renner
736740
- *aditya_sirish
737741
- *prasant_adhikari
@@ -760,6 +764,7 @@ people:
760764
- type: Alumni
761765
anchor: alumni
762766
people:
767+
- *marina_moore
763768
- *lois_delong
764769
- *preston_moore
765770
- *yiwen_li
@@ -1327,19 +1332,51 @@ publications:
13271332
### DO NOT FORGET TO ADD YOUR NEW TAG &XXXXXX TO THE ENTRIES AT THE BOTTOM ###
13281333
### IF YOU FORGET, YOUR ENTRIES WILL NOT SHOW UP ON THE SITE! ###
13291334

1335+
- &yelgundhalli_gittuf_ndss_2025
1336+
anchor: yelgundhalli_gittuf_ndss_2025
1337+
title: "Rethinking Trust in Forge-Based Git Security"
1338+
authors:
1339+
- name: "A.S.A. Yelgundhalli, P. Zielinski, R. Curtmola, J. Cappos"
1340+
project: *gittuf
1341+
booktitle: "Network and Distributed System Security Symposium 2025 (NDSS 2025)"
1342+
year: "2025"
1343+
pages: ""
1344+
publisher: ""
1345+
link: "/papers/yelgundhalli_gittuf_ndss_2025.pdf"
1346+
abstract: "Git is the most popular version control system today, with Git forges such as GitHub, GitLab, and Bitbucket used to add functionality. Significantly, these forges are used to enforce security controls. However, due to the lack of an open protocol for ensuring a repository’s integrity, forges cannot prove themselves to be trustworthy, and have to carry the responsibility of being non-verifiable trusted third parties in modern software supply chains.
1347+
1348+
In this paper, we present gittuf, a system that decentralizes Git security and enables every user to contribute to collectively enforcing the repository’s security. First, gittuf enables distributing of policy declaration and management responsibilities among more parties such that no single user is trusted entirely or unilaterally. Second, gittuf decentralizes the tracking of repository activity, ensuring that a single entity cannot manipulate repository events. Third, gittuf decentralizes policy enforcement by enabling all developers to independently verify the policy, eliminating the single point of trust placed in the forge as the only arbiter for whether a change in the repository is authorized. Thus, gittuf can provide strong security guarantees in the event of a compromise of the centralized forge, the underlying infrastructure, or a subset of privileged developers trusted to set policy. gittuf also implements policy features that can protect against unauthorized changes to branches and tags (i.e., pushes) as well as files/folders (i.e., commits). Our analysis of gittuf shows that its properties and policy features provide protections against previously seen version control system attacks. In addition, our evaluation of gittuf shows it is viable even for large repositories with a high volume of activity such as those of Git and Kubernetes (less than 4% storage overhead and under 0.59s of time to verify each push).
1349+
1350+
Currently, gittuf is an OpenSSF sandbox project hosted by the Linux Foundation. gittuf is being used in projects hosted by the OpenSSF and the CNCF, and an enterprise pilot at Bloomberg is underway."
1351+
13301352
- &covsbom_issre_2024
13311353
anchor: covsbom_issre_2024
13321354
title: "CovSBOM: Enhancing Software Bill of Materials with Integrated Code Coverage Analysis"
13331355
authors:
13341356
- name: "Y. Zhao, Y. Zhang, D. Chacko, J. Cappos."
13351357
project:
1336-
booktitle: "The 35th IEEE International Symposium on Software Reliability Engineering (ISSRE 2023)"
1358+
booktitle: "The 35th IEEE International Symposium on Software Reliability Engineering (ISSRE 2024)"
13371359
year: "2024"
13381360
pages: ""
13391361
publisher: ""
13401362
link: "/papers/covsbom_issre_2024.pdf"
13411363
abstract: "The widespread integration of open-source software into commercial codebases, government systems, and critical infrastructure presents significant security challenges, particularly due to the inclusion of vulnerable components. Software Bills of Materials (SBOMs) are crucial for tracking these components; however, they lack detailed insights into the actual utilization of each component, thereby limiting their effectiveness in vulnerability management. This paper introduces CovSBOM, a novel tool that integrates code coverage analysis into SBOMs to provide enhanced transparency and facilitate precise vulnerability detection. CovSBOM addresses the gap between current SBOM and security scanning tools by providing detailed insights into which parts of third-party libraries are actually being used, thereby reducing inefficiencies and the misallocation of developer resources caused by overemphasizing irrelevant vulnerabilities. Through a comprehensive evaluation of 23 large-scale applications, encompassing 1,614 dependencies and 145 vulnerability alerts, CovSBOM has demonstrated a significant reduction in false positives, accurately identifying 105 such instances. This improvement enhances the precision of vulnerability detection by approximately 72%, while effectively maintaining a reasonable level of scalability and usability."
13421364

1365+
- &moore_scudo_vehiclesec_2024
1366+
anchor: moore_scudo_vehiclesec_2024
1367+
title: "Securing Automotive Software Supply Chains"
1368+
authors:
1369+
- name: "M. Moore, A.S.A. Yelgundhalli, J. Cappos"
1370+
project: *uptane
1371+
booktitle: "Symposium on Vehicles Security and Privacy (VehicleSec) 2024"
1372+
year: "2024"
1373+
pages: ""
1374+
publisher: ""
1375+
link: "/papers/moore_scudo_vehiclesec_2024.pdf"
1376+
abstract: "Software supply chain attacks are a major concern and need to be addressed by every organization, including automakers. While there are many effective technologies in both the software delivery and broader software supply chain security space, combining these technologies presents challenges specific to automotive applications. We explore the trust boundaries between the software supply chain and software delivery systems to determine where verification of software supply chain metadata should occur, how to establish a root of trust, and how supply chain policy can be distributed. Using this exploration, we design Scudo, a secure combination of software over the air and software supply chain security technologies. We show that adding full verification of software supply chain metadata on-vehicle is not only inefficient, but is also largely unnecessary for security with multiple points of repository-side verification.
1377+
1378+
In addition, this paper describes a secure instantiation of Scudo, which integrates Uptane, a state of the art software update security solution, and in-toto, a comprehensive supply chain security framework. A practical deployment has shown that Scudo provides robust software supply chain protections. The client side power and processing costs are negligible, with the updated metadata comprising 0.504% of the total update transmission. The client side verification adds 0.21 seconds to the total update flow. This demonstrates that Scudo is easy to deploy in ways that can efficiently and effectively catch software supply chain attacks."
1379+
13431380
- &moore_artemis_2023
13441381
anchor: moore_artemis_2023
13451382
title: "Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems"
@@ -2974,6 +3011,7 @@ and the Debian popularity contest. Our tests found a total of 63 bugs in 31 appl
29743011
- type: Conference Papers
29753012
anchor: conference
29763013
publications:
3014+
- *yelgundhalli_gittuf_ndss_2025
29773015
- *covsbom_issre_2024
29783016
- *moore_artemis_2023
29793017
- *moore_port_icsoft_2022
@@ -3018,6 +3056,7 @@ and the Debian popularity contest. Our tests found a total of 63 bugs in 31 appl
30183056
- type: Workshop Papers
30193057
anchor: workshop
30203058
publications:
3059+
- *moore_scudo_vehiclesec_2024
30213060
- *almashaqbeh_ABC_cryblock_19
30223061
- *zhuang_sensibility_HotMobile_18
30233062
- *cappos_nspw_2014

0 commit comments

Comments
 (0)