Skip to main content

Showing 1–4 of 4 results for author: Torres-Arias, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.14635  [pdf, other

    cs.CR cs.SE

    Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors

    Authors: Taylor R Schorlemmer, Kelechi G Kalu, Luke Chigges, Kyung Myung Ko, Eman Abu Isghair, Saurabh Baghi, Santiago Torres-Arias, James C Davis

    Abstract: Many software applications incorporate open-source third-party packages distributed by public package registries. Guaranteeing authorship along this supply chain is a challenge. Package maintainers can guarantee package authorship through software signing. However, it is unclear how common this practice is, and whether the resulting signatures are created properly. Prior work has provided raw data… ▽ More

    Submitted 14 April, 2024; v1 submitted 25 January, 2024; originally announced January 2024.

    Comments: Accepted at IEEE Security & Privacy 2024 (S&P'24)

  2. arXiv:2311.05063  [pdf, other

    cs.CR cs.SE

    Rust for Embedded Systems: Current State, Challenges and Open Problems

    Authors: Ayushi Sharma, Shashank Sharma, Santiago Torres-Arias, Aravind Machiry

    Abstract: Embedded software is used in safety-critical systems such as medical devices and autonomous vehicles, where software defects, including security vulnerabilities, have severe consequences. Most embedded codebases are developed in unsafe languages, specifically C/C++, and are riddled with memory safety vulnerabilities. To prevent such vulnerabilities, RUST, a performant memory-safe systems language,… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

  3. arXiv:2310.14117  [pdf, other

    cs.CR cs.SE

    ZTD$_{JAVA}$: Mitigating Software Supply Chain Vulnerabilities via Zero-Trust Dependencies

    Authors: Paschal C. Amusuo, Kyle A. Robinson, Tanmay Singla, Huiyun Peng, Aravind Machiry, Santiago Torres-Arias, Laurent Simon, James C. Davis

    Abstract: Third-party software components like Log4J accelerate software application development but introduce substantial risk. These components have led to many software supply chain attacks. These attacks succeed because third-party software components are implicitly trusted in an application. Although several security defenses exist to reduce the risks from third-party software components, none of them… ▽ More

    Submitted 25 April, 2024; v1 submitted 21 October, 2023; originally announced October 2023.

    Comments: 15 pages, 5 figures, 5 tables

    ACM Class: K.6.5; D.4.6

  4. arXiv:2305.06463  [pdf, other

    cs.CR

    Speranza: Usable, privacy-friendly software signing

    Authors: Kelsey Merrill, Zachary Newman, Santiago Torres-Arias, Karen Sollins

    Abstract: Software repositories, used for wide-scale open software distribution, are a significant vector for security attacks. Software signing provides authenticity, mitigating many such attacks. Developer-managed signing keys pose usability challenges, but certificate-based systems introduce privacy problems. This work, Speranza, uses certificates to verify software authenticity but still provides anonym… ▽ More

    Submitted 16 September, 2023; v1 submitted 10 May, 2023; originally announced May 2023.

    Comments: 15 pages, 5 figures