Exorcist: automated differential analysis to detect compromises in closed-source software supply chains

The insertion of trojanised binaries into supply chains are a particularly subtle form of cyber-attack that require a multi-staged and complex deployment methodology to implement and execute. In the years preceding this research there has been a spike in closed-source software supply chain attacks u...

وصف كامل

التفاصيل البيبلوغرافية
المؤلفون الرئيسيون: Barr-Smith, F, Baker, R, Blazytko, T, Martinovic, I
التنسيق: Conference item
اللغة:English
منشور في: Association for Computing Machinery 2022