Logo des Repositoriums
 

You Can Run But You Can’t Hide: Runtime Protection Against Malicious Package Updates For Node.js

dc.contributor.authorPohl, Timo
dc.contributor.authorOhm, Marc
dc.contributor.authorBoes, Felix
dc.contributor.authorMeier, Michael
dc.contributor.editorWendzel, Steffen
dc.contributor.editorWressnegger, Christian
dc.contributor.editorHartmann, Laura
dc.contributor.editorFreiling, Felix
dc.contributor.editorArmknecht, Frederik
dc.contributor.editorReinfelder, Lena
dc.date.accessioned2024-04-19T12:54:03Z
dc.date.available2024-04-19T12:54:03Z
dc.date.issued2024
dc.description.abstractMalicious software packages are often used in software supply chain attacks. Detecting these packages is a top priority, and there have been many academic and commercial approaches developed for this purpose. In the event of an attack, it is essential to have resilience against malicious code. To address this issue, we introduce a runtime protection for Node.js that automatically limits the capabilities of packages to a minimum level. The implementation and evaluation of the detection and enforcement of necessary capabilities at runtime was conducted against known malicious attacks. Our approach successfully prevented 90 % of historical attacks with a median install-time overhead of less than 0.6 seconds and a median runtime overhead of less than 0.2 seconds.en
dc.identifier.doi10.18420/sicherheit2024_015
dc.identifier.isbn978-3-88579-739-5
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/43955
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofSicherheit 2024
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings Volume P-345
dc.subjectSoftware Supply Chain
dc.subjectPolicy Enforcement
dc.subjectAbstract Syntax Trees
dc.titleYou Can Run But You Can’t Hide: Runtime Protection Against Malicious Package Updates For Node.jsen
dc.typeText/Conference Paper
gi.citation.endPage241
gi.citation.publisherPlaceBonn
gi.citation.startPage231
gi.conference.date09.-11.04.2024
gi.conference.locationWorms
gi.conference.sessiontitleFull Paper Session 7 – Netzwerk- und Softwaresicherheit

Dateien

Originalbündel
1 - 1 von 1
Vorschaubild nicht verfügbar
Name:
A7-2.pdf
Größe:
533.22 KB
Format:
Adobe Portable Document Format