Exorcist: automated differential analysis to detect compromises in closed-source software supply chains
The insertion of trojanised binaries into supply chains are a particularly subtle form of cyber-attack that require a multi-staged and complex deployment methodology to implement and execute. In the years preceding this research there has been a spike in closed-source software supply chain attacks u...
Những tác giả chính: | , , , |
---|---|
Định dạng: | Conference item |
Ngôn ngữ: | English |
Được phát hành: |
Association for Computing Machinery
2022
|