{"title":"Protection Mechanism against Software Supply Chain Attacks through Blockchain","authors":"Muhammad Zeeshan Malik, Syed Zain Ali Bukhari","doi":"10.1109/ComTech57708.2023.10164932","DOIUrl":null,"url":null,"abstract":"Software supply chain attack is exceptionally fatal, overwhelmingly rapid, and almost effortless on the part of the attacker. A single compromise or hack can lead to multiple businesses sufferings because suppliers and providers have a vast user network. Protection against software supply chain attacks is being achieved through some outdated concepts like honeytokens and privileged pathway, but an integrated and proper mechanism is still lacking. In recent years, blockchain technology represents a fundamental shift that can replace conventional business models that rely on third parties for trust. This paper proposes a protection mechanism through validity concept with the implementation of blockchain to retain an immutable and trustworthy record of propagating payload (i.e., official update) that is transmitted across the supply chain systems. Blockchain can be used to circumvent these supply chain attacks by keeping a digital log of all propagating information. Each block contains the information regarding validity of propagating data, based on this an official update can be accepted or rejected.","PeriodicalId":203804,"journal":{"name":"2023 International Conference on Communication Technologies (ComTech)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Communication Technologies (ComTech)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ComTech57708.2023.10164932","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Software supply chain attack is exceptionally fatal, overwhelmingly rapid, and almost effortless on the part of the attacker. A single compromise or hack can lead to multiple businesses sufferings because suppliers and providers have a vast user network. Protection against software supply chain attacks is being achieved through some outdated concepts like honeytokens and privileged pathway, but an integrated and proper mechanism is still lacking. In recent years, blockchain technology represents a fundamental shift that can replace conventional business models that rely on third parties for trust. This paper proposes a protection mechanism through validity concept with the implementation of blockchain to retain an immutable and trustworthy record of propagating payload (i.e., official update) that is transmitted across the supply chain systems. Blockchain can be used to circumvent these supply chain attacks by keeping a digital log of all propagating information. Each block contains the information regarding validity of propagating data, based on this an official update can be accepted or rejected.