Skip to main content

Showing 1–14 of 14 results for author: Barais, O

Searching in archive cs. Search in all archives.
.
  1. On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI

    Authors: Piergiorgio Ladisa, Serena Elisa Ponta, Nicola Ronzoni, Matias Martinez, Olivier Barais

    Abstract: Current software supply chains heavily rely on open-source packages hosted in public repositories. Given the popularity of ecosystems like npm and PyPI, malicious users started to spread malware by publishing open-source packages containing malicious code. Recent works apply machine learning techniques to detect malicious packages in the npm ecosystem. However, the scarcity of samples poses a chal… ▽ More

    Submitted 14 October, 2023; originally announced October 2023.

    Comments: Proceedings of Annual Computer Security Applications Conference (ACSAC '23), December 4--8, 2023, Austin, TX, USA

  2. The Hitchhiker's Guide to Malicious Third-Party Dependencies

    Authors: Piergiorgio Ladisa, Merve Sahin, Serena Elisa Ponta, Marco Rosa, Matias Martinez, Olivier Barais

    Abstract: The increasing popularity of certain programming languages has spurred the creation of ecosystem-specific package repositories and package managers. Such repositories (e.g., npm, PyPI) serve as public databases that users can query to retrieve packages for various functionalities, whereas package managers automatically handle dependency resolution and package installation on the client side. These… ▽ More

    Submitted 6 October, 2023; v1 submitted 18 July, 2023; originally announced July 2023.

    Comments: Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses (SCORED '23), November 30, 2023, Copenhagen, Denmark

  3. arXiv:2304.05200  [pdf, other

    cs.CR cs.SE

    Journey to the Center of Software Supply Chain Attacks

    Authors: Piergiorgio Ladisa, Serena Elisa Ponta, Antonino Sabetta, Matias Martinez, Olivier Barais

    Abstract: This work discusses open-source software supply chain attacks and proposes a general taxonomy describing how attackers conduct them. We then provide a list of safeguards to mitigate such attacks. We present our tool "Risk Explorer for Software Supply Chains" to explore such information and we discuss its industrial use-cases.

    Submitted 11 April, 2023; originally announced April 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2204.04008

  4. arXiv:2210.03998  [pdf, other

    cs.CR

    Towards the Detection of Malicious Java Packages

    Authors: Piergiorgio Ladisa, Henrik Plate, Matias Martinez, Olivier Barais, Serena Elisa Ponta

    Abstract: Open-source software supply chain attacks aim at infecting downstream users by poisoning open-source packages. The common way of consuming such artifacts is through package repositories and the development of vetting strategies to detect such attacks is ongoing research. Despite its popularity, the Java ecosystem is the less explored one in the context of supply chain attacks. In this paper we p… ▽ More

    Submitted 8 October, 2022; originally announced October 2022.

  5. arXiv:2205.08350  [pdf, other

    cs.DC cs.AI

    RISCLESS: A Reinforcement Learning Strategy to Exploit Unused Cloud Resources

    Authors: Sidahmed Yalles, Mohamed Handaoui, Jean-Emile Dartois, Olivier Barais, Laurent d'Orazio, Jalil Boukhobza

    Abstract: One of the main objectives of Cloud Providers (CP) is to guarantee the Service-Level Agreement (SLA) of customers while reducing operating costs. To achieve this goal, CPs have built large-scale datacenters. This leads, however, to underutilized resources and an increase in costs. A way to improve the utilization of resources is to reclaim the unused parts and resell them at a lower price. Providi… ▽ More

    Submitted 28 April, 2022; originally announced May 2022.

  6. Taxonomy of Attacks on Open-Source Software Supply Chains

    Authors: Piergiorgio Ladisa, Henrik Plate, Matias Martinez, Olivier Barais

    Abstract: The widespread dependency on open-source software makes it a fruitful target for malicious actors, as demonstrated by recurring attacks. The complexity of today's open-source supply chains results in a significant attack surface, giving attackers numerous opportunities to reach the goal of injecting malicious code into open-source artifacts that is then downloaded and executed by victims. This w… ▽ More

    Submitted 19 April, 2022; v1 submitted 8 April, 2022; originally announced April 2022.

    Journal ref: 2023 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, US, 2023 pp. 1509-1526

  7. arXiv:2009.11208  [pdf, other

    cs.PF cs.DC cs.LG

    ReLeaSER: A Reinforcement Learning Strategy for Optimizing Utilization Of Ephemeral Cloud Resources

    Authors: Mohamed Handaoui, Jean-Emile Dartois, Jalil Boukhobza, Olivier Barais, Laurent d'Orazio

    Abstract: Cloud data center capacities are over-provisioned to handle demand peaks and hardware failures which leads to low resources' utilization. One way to improve resource utilization and thus reduce the total cost of ownership is to offer unused resources (referred to as ephemeral resources) at a lower price. However, reselling resources needs to meet the expectations of its customers in terms of Quali… ▽ More

    Submitted 10 December, 2020; v1 submitted 23 September, 2020; originally announced September 2020.

  8. arXiv:1908.09757  [pdf, other

    cs.SE

    API Beauty is in the eye of the Clients: 2.2 Million Maven Dependencies reveal the Spectrum of Client-API Usages

    Authors: Nicolas Harrand, Amine Benelallam, César Soto-Valero, François Bettega, Olivier Barais, Benoit Baudry

    Abstract: Hyrum's law states a common observation in the software industry: "With a sufficient number of users of an API, it does not matter what you promise in the contract: all observable behaviors of your system will be depended on by somebody". Meanwhile, recent research results seem to contradict this observation when they state that "for most APIs, there is a small number of features that are actually… ▽ More

    Submitted 19 October, 2021; v1 submitted 26 August, 2019; originally announced August 2019.

    Comments: 15 pages, 10 figures, 3 tables, 2 listings

    Journal ref: Journal of Systems and Software 2021

  9. The Emergence of Software Diversity in Maven Central

    Authors: César Soto-Valero, Amine Benelallam, Nicolas Harrand, Olivier Barais, Benoit Baudry

    Abstract: Maven artifacts are immutable: an artifact that is uploaded on Maven Central cannot be removed nor modified. The only way for developers to upgrade their library is to release a new version. Consequently, Maven Central accumulates all the versions of all the libraries that are published there, and applications that declare a dependency towards a library can pick any version. In this work, we hypot… ▽ More

    Submitted 14 March, 2019; v1 submitted 13 March, 2019; originally announced March 2019.

    Comments: Accepted for publication in 16th International Conference on Mining Software Repositories (MSR) at Montréal, Canada

  10. arXiv:1901.05392  [pdf, other

    cs.SE

    The Maven Dependency Graph: a Temporal Graph-based Representation of Maven Central

    Authors: Amine Benelallam, Nicolas Harrand, César Soto Valero, Benoit Baudry, Olivier Barais

    Abstract: The Maven Central Repository provides an extraordinary source of data to understand complex architecture and evolution phenomena among Java applications. As of September 6, 2018, this repository includes 2.8M artifacts (compiled piece of code implemented in a JVM-based language), each of which is characterized with metadata such as exact version, date of upload and list of dependencies towards oth… ▽ More

    Submitted 16 January, 2019; originally announced January 2019.

    Comments: 5 pages, 2 figures, 2 tables

  11. Weaving Rules into [email protected] for Embedded Smart Systems

    Authors: Ludovic Mouline, Thomas Hartmann, François Fouquet, Yves Le Traon, Johann Bourcier, Olivier Barais

    Abstract: Smart systems are characterised by their ability to analyse measured data in live and to react to changes according to expert rules. Therefore, such systems exploit appropriate data models together with actions, triggered by domain-related conditions. The challenge at hand is that smart systems usually need to process thousands of updates to detect which rules need to be triggered, often even on r… ▽ More

    Submitted 14 April, 2017; originally announced April 2017.

    Comments: pre-print version, published in the proceedings of MOMO-17 Workshop

  12. arXiv:1405.6817  [pdf, other

    cs.SE

    Kevoree Modeling Framework (KMF): Efficient modeling techniques for runtime use

    Authors: Fouquet Francois, Grégory Nain, Brice Morin, Erwan Daubert, Olivier Barais, Noël Plouzeau, Jean-Marc Jézéquel

    Abstract: The creation of Domain Specific Languages(DSL) counts as one of the main goals in the field of Model-Driven Software Engineering (MDSE). The main purpose of these DSLs is to facilitate the manipulation of domain specific concepts, by providing developers with specific tools for their domain of expertise. A natural approach to create DSLs is to reuse existing modeling standards and tools. In this a… ▽ More

    Submitted 27 May, 2014; originally announced May 2014.

    Comments: ISBN 978-2-87971-131-7; N° TR-SnT-2014-11 (2014)

    Report number: TR-SnT-2014-11

  13. Mashup of Meta-Languages and its Implementation in the Kermeta Language Workbench

    Authors: Jean-Marc Jézéquel, Benoit Combemale, Olivier Barais, Martin Monperrus, François Fouquet

    Abstract: With the growing use of domain-specific languages (DSL) in industry, DSL design and implementation goes far beyond an activity for a few experts only and becomes a challenging task for thousands of software engineers. DSL implementation indeed requires engineers to care for various concerns, from abstract syntax, static semantics, behavioral semantics, to extra-functional issues such as run-time p… ▽ More

    Submitted 4 June, 2013; originally announced June 2013.

    Comments: Published in Software and Systems Modeling (2013)

    Journal ref: Software and Systems Modeling, Springer Verlag, volume 14, 2015

  14. arXiv:0804.1696  [pdf, ps, other

    cs.PL cs.SE

    A classification of invasive patterns in AOP

    Authors: Freddy Munoz, Benoit Baudry, Olivier Barais

    Abstract: Aspect-Oriented Programming (AOP) improves modularity by encapsulating crosscutting concerns into aspects. Some mechanisms to compose aspects allow invasiveness as a mean to integrate concerns. Invasiveness means that AOP languages have unrestricted access to program properties. Such kind of languages are interesting because they allow performing complex operations and better introduce functiona… ▽ More

    Submitted 24 April, 2008; v1 submitted 10 April, 2008; originally announced April 2008.

    Report number: RR-6501