Supply Chain Insecurity: The Lack of Integrity Protection in SBOM Solutions

Guardat en:
Dades bibliogràfiques
Publicat a:arXiv.org (Dec 9, 2024), p. n/a
Autor principal: Ozkan, Can
Altres autors: Zou, Xinhai, Singelee, Dave
Publicat:
Cornell University Library, arXiv.org
Matèries:
Accés en línia:Citation/Abstract
Full text outside of ProQuest
Etiquetes: Afegir etiqueta
Sense etiquetes, Sigues el primer a etiquetar aquest registre!

MARC

LEADER 00000nab a2200000uu 4500
001 3142728241
003 UK-CbPIL
022 |a 2331-8422 
035 |a 3142728241 
045 0 |b d20241209 
100 1 |a Ozkan, Can 
245 1 |a Supply Chain Insecurity: The Lack of Integrity Protection in SBOM Solutions 
260 |b Cornell University Library, arXiv.org  |c Dec 9, 2024 
513 |a Working Paper 
520 3 |a The SolarWinds attack that exploited weaknesses in the software update mechanism highlights the critical need for organizations to have better visibility into their software dependencies and potential vulnerabilities associated with them, and the Software Bill of Materials (SBOM) is paramount in ensuring software supply chain security. Under the Executive Order issued by President Biden, the adoption of the SBOM has become obligatory within the United States. The executive order mandates that an SBOM should be provided for all software purchased by federal agencies. The main applications of SBOMs are vulnerability management and license management. This work presents an in-depth and systematic investigation into the integrity of SBOMs. We explore different attack vectors that can be exploited to manipulate SBOM data, including flaws in the SBOM generation and consumption phases in the SBOM life cycle. We thoroughly investigated four SBOM consumption tools and the generation process of SBOMs for seven prominent programming languages. Our systematic investigation reveals that the tools used for consumption lack integrity control mechanisms for dependencies. Similarly, the generation process is susceptible to integrity attacks as well, by manipulating dependency version numbers in package managers and additional files, resulting in incorrect SBOM data. This could lead to incorrect views on software dependencies and vulnerabilities being overlooked during SBOM consumption. To mitigate these issues, we propose a solution incorporating the decentralized storage of hash values of software libraries. 
653 |a Software reliability 
653 |a Computer program integrity 
653 |a Software 
653 |a Supply chains 
653 |a Executive orders 
653 |a Consumption 
653 |a Programming languages 
700 1 |a Zou, Xinhai 
700 1 |a Singelee, Dave 
773 0 |t arXiv.org  |g (Dec 9, 2024), p. n/a 
786 0 |d ProQuest  |t Engineering Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3142728241/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch 
856 4 0 |3 Full text outside of ProQuest  |u http://arxiv.org/abs/2412.05138