S3C2 Summit 2024-03: Industry Secure Supply Chain Summit
- URL: http://arxiv.org/abs/2405.08762v1
- Date: Tue, 14 May 2024 16:53:14 GMT
- Title: S3C2 Summit 2024-03: Industry Secure Supply Chain Summit
- Authors: Greg Tystahl, Yasemin Acar, Michel Cukier, William Enck, Christian Kastner, Alexandros Kapravelos, Dominik Wermke, Laurie Williams,
- Abstract summary: Supply chain security has become a very important vector to consider when defending against adversary attacks.
On March 7th, 2024 researchers from the Secure Software Supply Chain Center (S3C2) gathered 14 industry leaders, developers and consumers of the open source ecosystem to discuss the state of supply chain security.
The goal of the summit is to share insights between companies and developers alike to foster new collaborations and ideas moving forward.
- Score: 51.12259456590232
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: Supply chain security has become a very important vector to consider when defending against adversary attacks. Due to this, more and more developers are keen on improving their supply chains to make them more robust against future threats. On March 7th, 2024 researchers from the Secure Software Supply Chain Center (S3C2) gathered 14 industry leaders, developers and consumers of the open source ecosystem to discuss the state of supply chain security. The goal of the summit is to share insights between companies and developers alike to foster new collaborations and ideas moving forward. Through this meeting, participants were questions on best practices and thoughts how to improve things for the future. In this paper we summarize the responses and discussions of the summit. The panel questions can be found in the appendix.
Related papers
- SOK: Blockchain for Provenance [0.0]
Provenance, which traces data from its creation to manipulation, is crucial for ensuring data integrity, reliability, and trustworthiness.
Provenance technology has become a popular choice for implementing provenance due to its distributed, transparent, and immutable nature.
Numerous studies on blockchain designs are specifically dedicated to provenance, and specialize in this area.
arXiv Detail & Related papers (2024-07-25T01:46:49Z) - Collaborative Cybersecurity Using Blockchain: A Survey [0.0]
Collaborative cybersecurity relies on organizations sharing information to boost security, but trust management is a key concern.
Decentralized solutions like distributed ledgers, particularly blockchain, are crucial for eliminating single points of failure.
This paper addresses this gap by surveying blockchain's role in collaborative cybersecurity from 2016 to 2023.
arXiv Detail & Related papers (2024-03-07T11:12:35Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - A Framework for Agricultural Food Supply Chain using Blockchain [0.0]
The main aim of the paper is to create a trust and transparency in the food supply chain system.
Food supply chain is the process of tracing a crop from the farmer or producer to the buyer.
arXiv Detail & Related papers (2024-01-14T04:16:01Z) - SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems [43.80265187232706]
Cross-chain bridges are used to facilitate token and data exchanges across blockchains.
Although bridges are becoming increasingly popular, they are still in their infancy and have been attacked multiple times recently.
This paper analyzes the security landscape of cross-chain bridges in a holistic manner.
arXiv Detail & Related papers (2023-12-19T20:13:21Z) - Protecting the Decentralized Future: An Exploration of Common Blockchain
Attacks and their Countermeasures [1.1499361198674167]
Rising number of security threats have attracted cybercriminals as a target.
This research aims to offer a thorough analysis of mitigating blockchain attacks.
The study also highlights how crucial it is to take into account the particular needs of every blockchain application.
arXiv Detail & Related papers (2023-06-20T20:56:06Z) - Towards Security Enhancement of Blockchain-based Supply Chain Management [0.0]
The cybersecurity of modern systems has dramatically increased attention from both industrial and academia perspectives.
This paper shed the light on the blockchain and specifically on a smart contract technology which been used to handle the process of creation, verification and checking data over the supply chain management process.
arXiv Detail & Related papers (2022-09-11T18:52:11Z) - Hyperloop: A Cybersecurity Perspective [56.82349944873289]
We provide the first analysis of the cybersecurity challenges of the interconnections between the different components of the Hyperloop ecosystem.
We investigate possible infrastructure management approaches and their security concerns.
We discuss countermeasures and future directions for the security of the Hyperloop design.
arXiv Detail & Related papers (2022-09-07T12:10:36Z) - A System for Automated Open-Source Threat Intelligence Gathering and
Management [53.65687495231605]
SecurityKG is a system for automated OSCTI gathering and management.
It uses a combination of AI and NLP techniques to extract high-fidelity knowledge about threat behaviors.
arXiv Detail & Related papers (2021-01-19T18:31:35Z) - Learning to Recover Reasoning Chains for Multi-Hop Question Answering
via Cooperative Games [66.98855910291292]
We propose a new problem of learning to recover reasoning chains from weakly supervised signals.
How the evidence passages are selected and how the selected passages are connected are handled by two models.
For evaluation, we created benchmarks based on two multi-hop QA datasets.
arXiv Detail & Related papers (2020-04-06T03:54:38Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.