skip to main content
10.1145/3605770.3625207acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
extended-abstract

Software Bill of Materials in Java

Authors Info & Claims
Published:26 November 2023Publication History

ABSTRACT

Modern software applications are virtually never built entirely in-house. As a matter of fact, they reuse many third-party dependencies, which form the core of their software supply chain [1]. The large number of dependencies in an application has turned into a major challenge for both security and reliability. For example, to compromise a high-value application, malicious actors can choose to attack a less well-guarded dependency of the project [2]. Even when there is no malicious intent, bugs can propagate through the software supply chain and cause breakages in applications. Gathering accurate, upto- date information about all dependencies included in an application is, therefore, of vital importance.

References

  1. R. Cox, "Surviving Software Dependencies," Communications of the ACM, vol. 62, no. 9, pp. 36--43, 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. P. Ladisa, H. Plate, M. Martinez, and O. Barais, "SoK: Taxonomy of Attacks on Open-Source Software Supply Chains," in Proceedings of the IEEE Symposium on Security and Privacy (SP), may 2023.Google ScholarGoogle Scholar
  3. M. Balliu, B. Baudry, S. Bobadilla, M. Ekstedt, M. Monperrus, J. Ron, A. Sharma, G. Skoglund, C. Soto-Valero, and M. Wittlinger, "Challenges of Producing Software Bill of Materials for Java," IEEE Security & Privacy, pp. 2--13, 2023.Google ScholarGoogle Scholar
  4. C. Soto-Valero, N. Harrand, M. Monperrus, and B. Baudry, "A comprehensive study of bloated dependencies in the Maven ecosystem," Empirical Software Engineering, vol. 26, p. 45, Mar. 2021.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Software Bill of Materials in Java

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SCORED '23: Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses
        November 2023
        111 pages
        ISBN:9798400702631
        DOI:10.1145/3605770

        Copyright © 2023 Owner/Author

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 26 November 2023

        Check for updates

        Qualifiers

        • extended-abstract

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA
      • Article Metrics

        • Downloads (Last 12 months)80
        • Downloads (Last 6 weeks)11

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader