Skip to main content

Showing 1–12 of 12 results for author: Ponta, S E

Searching in archive cs. Search in all archives.
.
  1. On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI

    Authors: Piergiorgio Ladisa, Serena Elisa Ponta, Nicola Ronzoni, Matias Martinez, Olivier Barais

    Abstract: Current software supply chains heavily rely on open-source packages hosted in public repositories. Given the popularity of ecosystems like npm and PyPI, malicious users started to spread malware by publishing open-source packages containing malicious code. Recent works apply machine learning techniques to detect malicious packages in the npm ecosystem. However, the scarcity of samples poses a chal… ▽ More

    Submitted 14 October, 2023; originally announced October 2023.

    Comments: Proceedings of Annual Computer Security Applications Conference (ACSAC '23), December 4--8, 2023, Austin, TX, USA

  2. The Hitchhiker's Guide to Malicious Third-Party Dependencies

    Authors: Piergiorgio Ladisa, Merve Sahin, Serena Elisa Ponta, Marco Rosa, Matias Martinez, Olivier Barais

    Abstract: The increasing popularity of certain programming languages has spurred the creation of ecosystem-specific package repositories and package managers. Such repositories (e.g., npm, PyPI) serve as public databases that users can query to retrieve packages for various functionalities, whereas package managers automatically handle dependency resolution and package installation on the client side. These… ▽ More

    Submitted 6 October, 2023; v1 submitted 18 July, 2023; originally announced July 2023.

    Comments: Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses (SCORED '23), November 30, 2023, Copenhagen, Denmark

  3. arXiv:2304.05200  [pdf, other

    cs.CR cs.SE

    Journey to the Center of Software Supply Chain Attacks

    Authors: Piergiorgio Ladisa, Serena Elisa Ponta, Antonino Sabetta, Matias Martinez, Olivier Barais

    Abstract: This work discusses open-source software supply chain attacks and proposes a general taxonomy describing how attackers conduct them. We then provide a list of safeguards to mitigate such attacks. We present our tool "Risk Explorer for Software Supply Chains" to explore such information and we discuss its industrial use-cases.

    Submitted 11 April, 2023; originally announced April 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2204.04008

  4. arXiv:2210.03998  [pdf, other

    cs.CR

    Towards the Detection of Malicious Java Packages

    Authors: Piergiorgio Ladisa, Henrik Plate, Matias Martinez, Olivier Barais, Serena Elisa Ponta

    Abstract: Open-source software supply chain attacks aim at infecting downstream users by poisoning open-source packages. The common way of consuming such artifacts is through package repositories and the development of vetting strategies to detect such attacks is ongoing research. Despite its popularity, the Java ecosystem is the less explored one in the context of supply chain attacks. In this paper we p… ▽ More

    Submitted 8 October, 2022; originally announced October 2022.

  5. arXiv:2108.05115  [pdf, ps, other

    cs.SE

    The Used, the Bloated, and the Vulnerable: Reducing the Attack Surface of an Industrial Application

    Authors: Serena Elisa Ponta, Wolfram Fischer, Henrik Plate, Antonino Sabetta

    Abstract: Software reuse may result in software bloat when significant portions of application dependencies are effectively unused. Several tools exist to remove unused (byte)code from an application or its dependencies, thus producing smaller artifacts and, potentially, reducing the overall attack surface. In this paper we evaluate the ability of three debloating tools to distinguish which dependency class… ▽ More

    Submitted 11 August, 2021; originally announced August 2021.

  6. arXiv:2008.04568  [pdf, other

    cs.SE cs.CR

    Code-based Vulnerability Detection in Node.js Applications: How far are we?

    Authors: Bodin Chinthanet, Serena Elisa Ponta, Henrik Plate, Antonino Sabetta, Raula Gaikovina Kula, Takashi Ishio, Kenichi Matsumoto

    Abstract: With one of the largest available collection of reusable packages, the JavaScript runtime environment Node.js is one of the most popular programming application. With recent work showing evidence that known vulnerabilities are prevalent in both open source and industrial software, we propose and implement a viable code-based vulnerability detection tool for Node.js applications. Our case study lis… ▽ More

    Submitted 11 August, 2020; originally announced August 2020.

  7. arXiv:1902.02595  [pdf, other

    cs.SE cs.CR cs.LG

    A Manually-Curated Dataset of Fixes to Vulnerabilities of Open-Source Software

    Authors: Serena E. Ponta, Henrik Plate, Antonino Sabetta, Michele Bezzi, Cédric Dangremont

    Abstract: Advancing our understanding of software vulnerabilities, automating their identification, the analysis of their impact, and ultimately their mitigation is necessary to enable the development of software that is more secure. While operating a vulnerability assessment tool that we developed and that is currently used by hundreds of development units at SAP, we manually collected and curated a datase… ▽ More

    Submitted 19 March, 2019; v1 submitted 7 February, 2019; originally announced February 2019.

    Comments: This is a pre-print version of the paper that appears in the proceedings of The 16th International Conference on Mining Software Repositories (MSR), Data Showcase track

    Journal ref: Proceedings of The 16th International Conference on Mining Software Repositories (Data Showcase track), 2019

  8. arXiv:1808.09753  [pdf, other

    cs.SE cs.CR

    Vulnerable Open Source Dependencies: Counting Those That Matter

    Authors: Ivan Pashchenko, Henrik Plate, Serena Elisa Ponta, Antonino Sabetta, Fabio Massacci

    Abstract: BACKGROUND: Vulnerable dependencies are a known problem in today's open-source software ecosystems because OSS libraries are highly interconnected and developers do not always update their dependencies. AIMS: In this paper we aim to present a precise methodology, that combines the code-based analysis of patches with information on build, test, update dates, and group extracted from the very code r… ▽ More

    Submitted 29 August, 2018; originally announced August 2018.

    Comments: This is a pre-print of the paper that appears, with the same title, in the proceedings of the 12th International Symposium on Empirical Software Engineering and Measurement, 2018

  9. arXiv:1806.05893  [pdf, other

    cs.CR cs.SE

    Beyond Metadata: Code-centric and Usage-based Analysis of Known Vulnerabilities in Open-source Software

    Authors: Serena E. Ponta, Henrik Plate, Antonino Sabetta

    Abstract: The use of open-source software (OSS) is ever-increasing, and so is the number of open-source vulnerabilities being discovered and publicly disclosed. The gains obtained from the reuse of community-developed libraries may be offset by the cost of detecting, assessing, and mitigating their vulnerabilities in a timely fashion. In this paper we present a novel method to detect, assess and mitigate… ▽ More

    Submitted 12 July, 2018; v1 submitted 15 June, 2018; originally announced June 2018.

    Comments: To appear in the Proc. of the 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME) Added: - acknowledgements - citation to Dashevskyi et al. (TSE 2018), DOI: 10.1109/TSE.2018.2816033

  10. arXiv:1507.07479  [pdf, other

    cs.SE cs.CR

    Modularity for Security-Sensitive Workflows

    Authors: Daniel Ricardo dos Santos, Silvio Ranise, Serena Elisa Ponta

    Abstract: An established trend in software engineering insists on using components (sometimes also called services or packages) to encapsulate a set of related functionalities or data. By defining interfaces specifying what functionalities they provide or use, components can be combined with others to form more complex components. In this way, IT systems can be designed by mostly re-using existing component… ▽ More

    Submitted 27 July, 2015; originally announced July 2015.

  11. arXiv:1504.04971  [pdf, other

    cs.CR cs.SE

    Impact assessment for vulnerabilities in open-source software libraries

    Authors: Henrik Plate, Serena Elisa Ponta, Antonino Sabetta

    Abstract: Software applications integrate more and more open-source software (OSS) to benefit from code reuse. As a drawback, each vulnerability discovered in bundled OSS potentially affects the application. Upon the disclosure of every new vulnerability, the application vendor has to decide whether it is exploitable in his particular usage context, hence, whether users require an urgent application patch c… ▽ More

    Submitted 21 April, 2015; v1 submitted 20 April, 2015; originally announced April 2015.

  12. arXiv:1206.6757  [pdf, other

    cs.CR cs.SE

    Detection of Configuration Vulnerabilities in Distributed (Web) Environments

    Authors: Matteo Maria Casalino, Michele Mangili, Henrik Plate, Serena Elisa Ponta

    Abstract: Many tools and libraries are readily available to build and operate distributed Web applications. While the setup of operational environments is comparatively easy, practice shows that their continuous secure operation is more difficult to achieve, many times resulting in vulnerable systems exposed to the Internet. Authenticated vulnerability scanners and validation tools represent a means to dete… ▽ More

    Submitted 12 July, 2012; v1 submitted 28 June, 2012; originally announced June 2012.

    Comments: 18 pages. To appear in Proc. of Security and Privacy in Communication Networks - 8th Iternational ICST Conference, SecureComm, 2012