ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2005.09535
  4. Cited By
Backstabber's Knife Collection: A Review of Open Source Software Supply
  Chain Attacks

Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks

19 May 2020
Marc Ohm
H. Plate
Arnold Sykosch
M. Meier
ArXiv (abs)PDFHTML

Papers citing "Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks"

50 / 77 papers shown
CVE Breadcrumbs: Tracking Vulnerabilities Through Versioned Apache Libraries
CVE Breadcrumbs: Tracking Vulnerabilities Through Versioned Apache Libraries
Derek Garcia
Briana Lee
Ibrahim Matar
David Rickards
Andrew Zilnicki
29
0
0
01 Dec 2025
Software Supply Chain Security of Web3
Software Supply Chain Security of Web3
Martin Monperrus
138
0
0
15 Nov 2025
A Multi-Cloud Framework for Zero-Trust Workload Authentication
A Multi-Cloud Framework for Zero-Trust Workload Authentication
Saurabh Deochake
Ryan Murphy
Jeremiah Gearheart
74
0
0
17 Oct 2025
Lexo: Eliminating Stealthy Supply-Chain Attacks via LLM-Assisted Program Regeneration
Lexo: Eliminating Stealthy Supply-Chain Attacks via LLM-Assisted Program Regeneration
Evangelos Lamprou
Julian Dai
Grigoris Ntousakis
Martin Rinard
N. Vasilakis
AAML
163
0
0
16 Oct 2025
Leveraging Code Cohesion Analysis to Identify Source Code Supply Chain Attacks
Leveraging Code Cohesion Analysis to Identify Source Code Supply Chain Attacks
Maor Reuben
Ido Mendel
Or Feldman
Moshe Kravchik
Mordehai Guri
Rami Puzis
203
0
0
16 Oct 2025
Reproducible Builds for Quantum Computing
Reproducible Builds for Quantum Computing
Iyán Méndez Veiga
Esther Hänggi
106
0
0
02 Oct 2025
FuncPoison: Poisoning Function Library to Hijack Multi-agent Autonomous Driving Systems
FuncPoison: Poisoning Function Library to Hijack Multi-agent Autonomous Driving Systems
Yuzhen Long
Songze Li
AAML
191
1
0
29 Sep 2025
Trustworthy and Confidential SBOM Exchange
Trustworthy and Confidential SBOM Exchange
Eman Abu Ishgair
C. Okafor
Marcela S. Melara
Santiago Torres-Arias
169
1
0
16 Sep 2025
Unlocking Reproducibility: Automating re-Build Process for Open-Source Software
Unlocking Reproducibility: Automating re-Build Process for Open-Source Software
Behnaz Hassanshahi
Trong Nhan Mai
Benjamin Selwyn Smith
Nicholas Allen
134
2
0
10 Sep 2025
ImportSnare: Directed "Code Manual" Hijacking in Retrieval-Augmented Code Generation
ImportSnare: Directed "Code Manual" Hijacking in Retrieval-Augmented Code Generation
Kai Ye
Liangcai Su
Chenxiong Qian
SILM
197
2
0
09 Sep 2025
On the (In)Security of Loading Machine Learning Models
On the (In)Security of Loading Machine Learning Models
Gabriele Digregorio
Marco Di Gennaro
S. Zanero
Stefano Longari
Michele Carminati
ELM
212
1
0
08 Sep 2025
Passwords and FIDO2 Are Meant To Be Secret: A Practical Secure Authentication Channel for Web Browsers
Passwords and FIDO2 Are Meant To Be Secret: A Practical Secure Authentication Channel for Web Browsers
Senjuti Dutta
T. Yadav
Garrett Smith
K. Seamons
Scott Ruoti
153
0
0
02 Sep 2025
PickleBall: Secure Deserialization of Pickle-based Machine Learning Models (Extended Report)
PickleBall: Secure Deserialization of Pickle-based Machine Learning Models (Extended Report)
A. Kellas
Neophytos Christou
Wenxin Jiang
Penghui Li
Laurent Simon
Yaniv David
V. Kemerlis
James C. Davis
Junfeng Yang
AAML
174
3
0
21 Aug 2025
NodeShield: Runtime Enforcement of Security-Enhanced SBOMs for Node.js
NodeShield: Runtime Enforcement of Security-Enhanced SBOMs for Node.js
Eric Cornelissen
Musard Balliu
138
2
0
19 Aug 2025
DALEQ -- Explainable Equivalence for Java Bytecode
DALEQ -- Explainable Equivalence for Java Bytecode
Jens Dietrich
Behnaz Hassanshahi
106
2
0
03 Aug 2025
Open Source, Open Threats? Investigating Security Challenges in Open-Source Software
Open Source, Open Threats? Investigating Security Challenges in Open-Source Software
Seyed Ali Akhavani
Behzad Ousat
Amin Kharraz
211
6
0
15 Jun 2025
"I wasn't sure if this is indeed a security risk": Data-driven Understanding of Security Issue Reporting in GitHub Repositories of Open Source npm Packages
"I wasn't sure if this is indeed a security risk": Data-driven Understanding of Security Issue Reporting in GitHub Repositories of Open Source npm Packages
Rajdeep Ghosh
Shiladitya De
Mainack Mondal
175
1
0
09 Jun 2025
Securing the Software Package Supply Chain for Critical Systems
Securing the Software Package Supply Chain for Critical Systems
Ritwik Murali
Akash Ravi
169
0
0
28 May 2025
Eradicating the Unseen: Detecting, Exploiting, and Remediating a Path Traversal Vulnerability across GitHub
Eradicating the Unseen: Detecting, Exploiting, and Remediating a Path Traversal Vulnerability across GitHubACM Asia Conference on Computer and Communications Security (AsiaCCS), 2025
Jafar Akhoundali
Hamidreza Hamidi
Kristian Rietveld
Olga Gadyatskaya
356
1
0
26 May 2025
ARMS: A Vision for Actor Reputation Metric Systems in the Open-Source Software Supply Chain
ARMS: A Vision for Actor Reputation Metric Systems in the Open-Source Software Supply Chain
Kelechi G. Kalu
Sofia Okorafor
Betül Durak
Kim Laine
R. C. Moreno
Santiago Torres-Arias
James C. Davis
207
3
0
24 May 2025
ROSA: Finding Backdoors with Fuzzing
ROSA: Finding Backdoors with FuzzingInternational Conference on Software Engineering (ICSE), 2025
Dimitri Kokkonis
Michaël Marcozzi
Emilien Decoux
Stefano Zacchiroli
278
0
0
13 May 2025
LibVulnWatch: A Deep Assessment Agent System and Leaderboard for Uncovering Hidden Vulnerabilities in Open-Source AI Libraries
LibVulnWatch: A Deep Assessment Agent System and Leaderboard for Uncovering Hidden Vulnerabilities in Open-Source AI Libraries
Zekun Wu
Seonglae Cho
U. Mohammed
Cristian Muñoz
Kleyton Costa
Xin Guan
Theo King
Ze Wang
Emre Kazim
Adriano Soares Koshiyama
ELM
345
2
0
13 May 2025
Sleeping Giants - Activating Dormant Java Deserialization Gadget Chains through Stealthy Code Changes
Sleeping Giants - Activating Dormant Java Deserialization Gadget Chains through Stealthy Code Changes
Bruno Kreyssig
Sabine Houy
Timothée Riom
Alexandre Bartel
234
0
0
29 Apr 2025
Automatically Generating Rules of Malicious Software Packages via Large Language Model
Automatically Generating Rules of Malicious Software Packages via Large Language ModelDependable Systems and Networks (DSN), 2025
XiangRui Zhang
HaoYu Chen
YongZhong He
Wenjia Niu
Qiang Li
277
5
0
24 Apr 2025
User Profiles: The Achilles' Heel of Web Browsers
User Profiles: The Achilles' Heel of Web Browsers
Dolière Francis Somé
Moaz Airan
Zakir Durumeric
Cristian-Alexandru Staicu
250
0
0
24 Apr 2025
Bomfather: An eBPF-based Kernel-level Monitoring Framework for Accurate Identification of Unknown, Unused, and Dynamically Loaded Dependencies in Modern Software Supply Chains
Bomfather: An eBPF-based Kernel-level Monitoring Framework for Accurate Identification of Unknown, Unused, and Dynamically Loaded Dependencies in Modern Software Supply Chains
Naveen Srinivasan
Nathan Naveen
Neil Naveen
293
1
0
03 Mar 2025
DySec: A Machine Learning-based Dynamic Analysis for Detecting Malicious Packages in PyPI Ecosystem
DySec: A Machine Learning-based Dynamic Analysis for Detecting Malicious Packages in PyPI Ecosystem
Sk Tanzir Mehedi
Chadni Islam
Gowri Ramachandran
Raja Jurdak
261
4
0
01 Mar 2025
ConfuGuard: Using Metadata to Detect Active and Stealthy Package Confusion Attacks Accurately and at Scale
ConfuGuard: Using Metadata to Detect Active and Stealthy Package Confusion Attacks Accurately and at Scale
Wenxin Jiang
Berk Çakar
Mikola Lysenko
James C. Davis
548
0
0
27 Feb 2025
Pinning Is Futile: You Need More Than Local Dependency Versioning to Defend against Supply Chain Attacks
Pinning Is Futile: You Need More Than Local Dependency Versioning to Defend against Supply Chain Attacks
Hao He
Bogdan Vasilescu
Jane Hsieh
158
8
0
10 Feb 2025
Six Million (Suspected) Fake Stars in GitHub: A Growing Spiral of Popularity Contests, Spams, and Malware
Six Million (Suspected) Fake Stars in GitHub: A Growing Spiral of Popularity Contests, Spams, and Malware
Hao He
Haoqin Yang
Philipp Burckhardt
A. Kapravelos
Bogdan Vasilescu
Jane Hsieh
406
6
0
18 Dec 2024
A Study of Malware Prevention in Linux Distributions
Duc-Ly Vu
Trevor Dunlap
Karla Obermeier-Velazquez
Thanh-Cong Nguyen
Paul Gibert
J. Meyers
Santiago Torres-Arias
502
1
0
17 Nov 2024
Levels of Binary Equivalence for the Comparison of Binaries from Alternative Builds
Levels of Binary Equivalence for the Comparison of Binaries from Alternative Builds
Jens Dietrich
Tim White
Behnaz Hassanshahi
P. Krishnan
278
8
0
11 Oct 2024
Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on
  Pre-trained Model Hubs
Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model HubsInternational Conference on Automated Software Engineering (ASE), 2024
Jian Zhao
Shenao Wang
Yanjie Zhao
Xinyi Hou
Kailong Wang
Peiming Gao
Yuanchao Zhang
Chen Wei
Haoyu Wang
317
29
0
14 Sep 2024
Towards Robust Detection of Open Source Software Supply Chain Poisoning
  Attacks in Industry Environments
Towards Robust Detection of Open Source Software Supply Chain Poisoning Attacks in Industry EnvironmentsInternational Conference on Automated Software Engineering (ASE), 2024
Xinyi Zheng
Chen Wei
Shenao Wang
Yanjie Zhao
Peiming Gao
Yuanchao Zhang
Kailong Wang
Haoyu Wang
217
22
0
14 Sep 2024
Maven-Hijack: Software Supply Chain Attack Exploiting Packaging Order
Maven-Hijack: Software Supply Chain Attack Exploiting Packaging Order
Frank Reyes
Federico Bono
Aman Sharma
Benoit Baudry
Martin Monperrus
274
1
0
26 Jul 2024
Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A
  Zero-Shot Generation with Large Language Models
Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A Zero-Shot Generation with Large Language Models
Ying Zhang
Xiaoyan Zhou
Hui Wen
Wenjia Niu
Jiqiang Liu
Haining Wang
Qiang Li
243
13
0
11 Jul 2024
Enhancing Software Supply Chain Resilience: Strategy For Mitigating
  Software Supply Chain Security Risks And Ensuring Security Continuity In
  Development Lifecycle
Enhancing Software Supply Chain Resilience: Strategy For Mitigating Software Supply Chain Security Risks And Ensuring Security Continuity In Development Lifecycle
Ahmed Akinsola
Abdullah Akinde
136
5
0
08 Jul 2024
GoSurf: Identifying Software Supply Chain Attack Vectors in Go
GoSurf: Identifying Software Supply Chain Attack Vectors in Go
Carmine Cesarano
Vivi Andersson
Roberto Natella
Martin Monperrus
130
2
0
05 Jul 2024
SBOM.EXE: Countering Dynamic Code Injection based on Software Bill of
  Materials in Java
SBOM.EXE: Countering Dynamic Code Injection based on Software Bill of Materials in Java
Aman Sharma
Martin Wittlinger
Benoit Baudry
Martin Monperrus
304
7
0
28 Jun 2024
QuADTool: Attack-Defense-Tree Synthesis, Analysis and Bridge to
  Verification
QuADTool: Attack-Defense-Tree Synthesis, Analysis and Bridge to Verification
Florian Dorfhuber
Julia Eisentraut
Katharina Klioba
Jan Křetínský
195
0
0
21 Jun 2024
SoK: Analysis of Software Supply Chain Security by Establishing Secure
  Design Properties
SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties
C. Okafor
Taylor R. Schorlemmer
Santiago Torres-Arias
James C. Davis
468
72
0
14 Jun 2024
We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs
We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs
Joseph Spracklen
Raveen Wijewickrama
A. H. M. N. Sakib
Anindya Maiti
Murtuza Jadliwala
Murtuza Jadliwala
590
55
0
12 Jun 2024
SoK: A Defense-Oriented Evaluation of Software Supply Chain Security
SoK: A Defense-Oriented Evaluation of Software Supply Chain Security
Eman Abu Ishgair
Marcela S. Melara
Santiago Torres-Arias
329
4
0
23 May 2024
FV8: A Forced Execution JavaScript Engine for Detecting Evasive
  Techniques
FV8: A Forced Execution JavaScript Engine for Detecting Evasive Techniques
Nikolaos Pantelaios
A. Kapravelos
230
6
0
21 May 2024
A Large-scale Fine-grained Analysis of Packages in Open-Source Software
  Ecosystems
A Large-scale Fine-grained Analysis of Packages in Open-Source Software Ecosystems
Xiaoyan Zhou
Feiran Liang
Zhaojie Xie
Yang Lan
Wenjia Niu
Jiqiang Liu
Haining Wang
Qiang Li
358
6
0
17 Apr 2024
Just another copy and paste? Comparing the security vulnerabilities of
  ChatGPT generated code and StackOverflow answers
Just another copy and paste? Comparing the security vulnerabilities of ChatGPT generated code and StackOverflow answers
Sivana Hamer
Marcelo dÁmorim
Laurie A. Williams
SILMELM
319
40
0
22 Mar 2024
DevPhish: Exploring Social Engineering in Software Supply Chain Attacks
  on Developers
DevPhish: Exploring Social Engineering in Software Supply Chain Attacks on Developers
Hossein Siadati
Sima Jafarikhah
Elif Sahin
Terrence Brent Hernandez
Elijah Lorenzo Tripp
Denis Khryashchev
151
6
0
28 Feb 2024
Malicious Package Detection using Metadata Information
Malicious Package Detection using Metadata InformationThe Web Conference (WWW), 2024
Sajal Halder
Michael Bewong
Arash Mahboubi
Yinhao Jiang
Md. Rafiqul Islam
Md. Zahidul Islam
Ryan H. L. Ip
Muhammad Ejaz Ahmed
Gowri Ramachandran
Muhammad Ali Babar
226
21
0
12 Feb 2024
Passwords Are Meant to Be Secret: A Practical Secure Password Entry
  Channel for Web Browsers
Passwords Are Meant to Be Secret: A Practical Secure Password Entry Channel for Web Browsers
Senjuti Dutta
T. Yadav
Kenneth R. Seamons
Scott Ruoti
138
2
0
09 Feb 2024
Why Not Mitigate Vulnerabilities in Helm Charts?
Why Not Mitigate Vulnerabilities in Helm Charts?
Yihao Chen
Jiahuei Lin
Bram Adams
Ahmed E. Hassan
145
1
0
23 Dec 2023
12
Next
Page 1 of 2