Exorcist: automated differential analysis to detect compromises in closed-source software supply chains
The insertion of trojanised binaries into supply chains are a particularly subtle form of cyber-attack that require a multi-staged and complex deployment methodology to implement and execute. In the years preceding this research there has been a spike in closed-source software supply chain attacks u...
Main Authors: | Barr-Smith, F, Baker, R, Blazytko, T, Martinovic, I |
---|---|
Format: | Conference item |
Language: | English |
Published: |
Association for Computing Machinery
2022
|
Similar Items
-
The exorcist /
by: 309291 Blatty, William Peter
Published: (1972) -
Was King David an Exorcist?
by: Marcin Biegas
Published: (2023-10-01) -
Jesus the Angry Exorcist
by: Torsten Löfstedt
Published: (2023-08-01) -
Beyond Amarna: exorcists without borders in the Levant
by: Graciela Gestoso Singer
Published: (2023-12-01) -
Covert Institutionality: Sacred Mountains, Witches and Exorcists
by: Filip Buekens
Published: (2016-11-01)