C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks
Abstract
References
Recommendations
On the Feasibility of Detecting Software Supply Chain Attacks
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)The Supply chain attack is the stealthy and sophisticated cyberattack that aims to compromise a target by exploiting weaknesses and vulnerabilities in its supply chain. Recent supply chain attacks (e.g., SolarWinds attack) have compromised some of the ...
SoK: Combating threats in the digital supply chain
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecuritySupply chain attacks have been a security concern for many years, and their number and severity are expected to continue to grow in the years to come. In the ICT domain, ensuring the integrity of the supply chain is becoming an essential concern, as ...
Towards detection of software supply chain attacks by forensic artifacts
ARES '20: Proceedings of the 15th International Conference on Availability, Reliability and SecurityThird-party dependencies may introduce security risks to the software supply chain and hence yield harm to their dependent software. There are many known cases of malicious open source packages posing risks to developers and end users. However, while ...
Comments
Information & Contributors
Information
Published In
Publisher
Springer-Verlag
Berlin, Heidelberg
Publication History
Author Tags
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
View options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in