论文标题
旨在测量对解释语言的包装管理人员的供应链攻击
Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages
论文作者
论文摘要
包装管理人员已成为现代软件开发过程的重要组成部分。他们允许开发人员重复使用第三方代码,共享自己的代码,最大程度地减少其代码库并简化构建过程。但是,最近的报告表明,攻击者滥用了软件包管理员分发恶意软件,向开发人员和最终用户带来了重大的安全风险。例如,Eslint-Scope是NPM中每周下载数百万个下载的软件包,被妥协了从开发人员那里窃取凭据。为了了解使最近的供应链攻击成为可能的安全差距和错位的信任,我们提出了一个比较框架,以定性地评估包装管理者对解释语言的功能和安全功能。根据定性评估,我们应用了众所周知的程序分析技术,例如元数据,静态和动态分析来研究注册表滥用。我们最初的努力发现了339个新的恶意包裹,我们向注册表报告了删除。包装管理器维护者从339个包裹中确认了278(82%),其中三个包含超过100,000个下载。对于这些包裹,我们获得了官方的CVE号码,以加快从受感染的受害者身上删除这些包裹。我们概述了定制计划分析工具以解释语言并将管道释放为社区建立和帮助保护软件供应链的参考点的挑战。
Package managers have become a vital part of the modern software development process. They allow developers to reuse third-party code, share their own code, minimize their codebase, and simplify the build process. However, recent reports showed that package managers have been abused by attackers to distribute malware, posing significant security risks to developers and end-users. For example, eslint-scope, a package with millions of weekly downloads in Npm, was compromised to steal credentials from developers. To understand the security gaps and the misplaced trust that make recent supply chain attacks possible, we propose a comparative framework to qualitatively assess the functional and security features of package managers for interpreted languages. Based on qualitative assessment, we apply well-known program analysis techniques such as metadata, static, and dynamic analysis to study registry abuse. Our initial efforts found 339 new malicious packages that we reported to the registries for removal. The package manager maintainers confirmed 278 (82%) from the 339 reported packages where three of them had more than 100,000 downloads. For these packages we were issued official CVE numbers to help expedite the removal of these packages from infected victims. We outline the challenges of tailoring program analysis tools to interpreted languages and release our pipeline as a reference point for the community to build on and help in securing the software supply chain.