Research Directions in Software Supply Chain Security
L. Williams, G. Benedetti, S. Hamer, R. Paramitha, I. Rahman, M. Tamanna, G. Tystahl, N. Zahan, P. Morrison, Y. Acar, M. Cukier, C. Kästner, A. Kapravelos, D. Wermke, W. Enck, ACM Transactions on Software Engineering and Methodology 34 (2025) 1–38.
Download
No fulltext has been uploaded.
DOI
Journal Article
| Published
| English
Author
Williams, Laurie;
Benedetti, Giacomo;
Hamer, Sivana;
Paramitha, Ranindya;
Rahman, Imranur;
Tamanna, Mahzabin;
Tystahl, Greg;
Zahan, Nusrat;
Morrison, Patrick;
Acar, Yasemin;
Cukier, Michel;
Kästner, Christian
All
All
Abstract
<jats:p>
Reusable software libraries, frameworks, and components, such as those provided by open source ecosystems and third-party suppliers, accelerate digital innovation. However, recent years have shown almost exponential growth in attackers leveraging these software artifacts to launch software supply chain attacks. Past well-known software supply chain attacks include the SolarWinds, log4j, and xz utils incidents. Supply chain attacks are considered to have three major attack vectors: through vulnerabilities and malware accidentally or intentionally injected into open source and third-party
<jats:italic>dependencies/components/containers</jats:italic>
; by infiltrating the
<jats:italic>build infrastructure</jats:italic>
during the build and deployment processes; and through targeted techniques aimed at the
<jats:italic>humans</jats:italic>
involved in software development, such as through social engineering. Plummeting trust in the software supply chain could decelerate digital innovation if the software industry reduces its use of open source and third-party artifacts to reduce risks. This article contains perspectives and knowledge obtained from intentional outreach with practitioners to understand their practical challenges and from extensive research efforts. We then provide an overview of current research efforts to secure the software supply chain. Finally, we propose a future research agenda to close software supply chain attack vectors and support the software industry.
</jats:p>
Publishing Year
Journal Title
ACM Transactions on Software Engineering and Methodology
Volume
34
Issue
5
Page
1-38
LibreCat-ID
Cite this
Williams L, Benedetti G, Hamer S, et al. Research Directions in Software Supply Chain Security. ACM Transactions on Software Engineering and Methodology. 2025;34(5):1-38. doi:10.1145/3714464
Williams, L., Benedetti, G., Hamer, S., Paramitha, R., Rahman, I., Tamanna, M., Tystahl, G., Zahan, N., Morrison, P., Acar, Y., Cukier, M., Kästner, C., Kapravelos, A., Wermke, D., & Enck, W. (2025). Research Directions in Software Supply Chain Security. ACM Transactions on Software Engineering and Methodology, 34(5), 1–38. https://doi.org/10.1145/3714464
@article{Williams_Benedetti_Hamer_Paramitha_Rahman_Tamanna_Tystahl_Zahan_Morrison_Acar_et al._2025, title={Research Directions in Software Supply Chain Security}, volume={34}, DOI={10.1145/3714464}, number={5}, journal={ACM Transactions on Software Engineering and Methodology}, publisher={Association for Computing Machinery (ACM)}, author={Williams, Laurie and Benedetti, Giacomo and Hamer, Sivana and Paramitha, Ranindya and Rahman, Imranur and Tamanna, Mahzabin and Tystahl, Greg and Zahan, Nusrat and Morrison, Patrick and Acar, Yasemin and et al.}, year={2025}, pages={1–38} }
Williams, Laurie, Giacomo Benedetti, Sivana Hamer, Ranindya Paramitha, Imranur Rahman, Mahzabin Tamanna, Greg Tystahl, et al. “Research Directions in Software Supply Chain Security.” ACM Transactions on Software Engineering and Methodology 34, no. 5 (2025): 1–38. https://doi.org/10.1145/3714464.
L. Williams et al., “Research Directions in Software Supply Chain Security,” ACM Transactions on Software Engineering and Methodology, vol. 34, no. 5, pp. 1–38, 2025, doi: 10.1145/3714464.
Williams, Laurie, et al. “Research Directions in Software Supply Chain Security.” ACM Transactions on Software Engineering and Methodology, vol. 34, no. 5, Association for Computing Machinery (ACM), 2025, pp. 1–38, doi:10.1145/3714464.