[1] |
Qi’anxin Code Security Laboratory. 2022 China Software Supply Chain Security Analysis Report[EB/OL]. (2022-07-26)[2022-11-19]. https://www.qianxin.com/threat/r-portdetail?report_id-161.
|
|
奇安信代码安全实验室. 2022中国软件供应链安全分析报告[EB/OL]. (2022-07-26)[2022-11-19]. https://www.qianxin.com/threat/r-portdetail?report_id-161.
|
[2] |
MARC O, HENRIK P, ARNOLD S, et al. A Review of Open Source Software Supply Chain Attacks[EB/OL]. (2020-05-19)[2022-11-13]. https://arxiv.org/abs/2005.09535.
|
[3] |
BLESSMAN D. Protecting Your Software Supply Chain[J]. Risk Management, 2019, 66(1): 10-11.
|
[4] |
ELLISON R J, WOODY C. Supply-Chain Risk Management: Incorporating Security into Software Development[C]// IEEE. 2010 43rd Hawaii International Conference on System Sciences. New York: IEEE, 2010: 1-10.
|
[5] |
YAN Dapeng, NIU Yuqing, LIU Kui, et al. Estimating the Attack Surface from Residual Vulnerabilities in Open Source Software Supply Chain[EB/OL]. (2021-12-06)[2022-11-13]. https://ieeexplore.ieee.org/document/9724801.
|
[6] |
BARTOL N. Cyber Supply Chain Security Practices DNA-Filling in the Puzzle Using a Diverse Set of Disciplines(Article)[J]. Technovation, 2014, 34(7): 354-361.
doi: 10.1016/j.technovation.2014.01.005
URL
|
[7] |
ZHAI Yanfen, ZENG Jin, YUAN Wei, et al. Software Supply Chain Risk Assessment System and Practice[J]. Cybersecurity & Informatization, 2022(2): 33-34.
|
[8] |
ALBERTS C J, DOROFEE A J, CREEL R, et al. A Systemic Approach for Assessing Software Supply-Chain Risk[C]// IEEE. 2011 44th Hawaii International Conference on System Sciences. Piscataway: IEEE, 2011: 1-8.
|
[9] |
REN Yi, GUAN Jianbo, MA Jun, et al. CLASC: A Changelog Based Automatic Code Source Classification Method for Operating System Packages[C]// IEEE. 2019 26th Asia-Pacific Software Engineering Conference (APSEC). Piscataway: IEEE, 2019: 378-385.
|
[10] |
ZHAO Liang. Analysis of Impact of Open Source Components in Mixed Source Software Projects[J]. Computer Science, 2020, 47(S2): 541-543, 583.
|
|
赵亮. 混源软件项目中的开源组件影响分析[J]. 计算机科学, 2020, 47(S2): 541-543, 583.
|
[11] |
LIANG Guanyu, WU Yanjun, WU Jingzheng, et al. Open Source Software Supply Chain for Reliability Assurance of Operating Systems[J]. Journal of Software, 2020, 31(10): 3056-3073.
|
|
梁冠宇, 武延军, 吴敬征, 等. 面向操作系统可靠性保障的开源软件供应链[J]. 软件学报, 2020, 31(10): 3056-3073.
|
[12] |
POORNALINGA K S, RAJKUMAR P. Survey on Continuous Integration, Deployment and Delivery in Agile and DevOps Practices[J]. International Journal of Computer Sciences and Engineering, 2016, 4(4): 213-216.
|
[13] |
TAVANA M, SOLTANIFAR M, SANTOS-ARTEAGA F J. Analytical Hierarchy Process: Revolution and Evolution[EB/OL]. (2021-12-02)[2022-11-13]. https://link.springer.com/article/10.1007/s10479-021-04432-2.
|
[14] |
Xin’anmeng Company, NSFOCUS. White Paper on Software Supply Chain Security Technology[EB/OL]. (2022-07-18)[2022-11-13]. https://www.nsfocus.com.cn/html-2022/263_0718/1-86.html.
|
|
新安盟公司,绿盟科技公司. 软件供应链安全技术白皮书[EB/OL]. (2022-07-18)[2022-11-13]. https://www.nsfocus.com.cn/html-2022/263_0718/1-86.html.
|
[15] |
JANG Jiyong, AGRAWAL A, BRUMLEY D. ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions[C]// IEEE. 2012 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2012: 48-62.
|
[16] |
CRISTIAN C, DANIEL D, DAWSON E. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs[C]// USENIX. Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation(OSDI’08). Berkeley: USENIX, 2008: 209-224.
|
[17] |
ENGLER D, CHEN D Y, HALLEM S, et al. Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code[J]. SIGPS Operating Systems Review, 2001, 35(5): 57-72.
|
[18] |
SUTTON M, GREENE A, AMINI P. Fuzzing: Brute Force Vulnerability Discovery[M]. London: Addison-Wesley Professional, 2007.
|
[19] |
NEWSOME J. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software[J]. Chinese Journal of Engineering Mathematics, 2005, 29(5): 720-724.
|
[20] |
GUO Min, NI Chen, LU Lin. The Practice of Interactive Application Security Testing in Level Evaluation[J]. Netinfo Security, 2019 (S1): 56-59.
|
|
郭敏, 倪辰, 陆琳. 交互式应用安全测试在等级测评中的实践[J]. 信息网络安全, 2019(S1):56-59.
|
[21] |
YU Bo, FANG Ying, YANG Qiang, et al. A Survey of Malware Behavior Description and Analysis[J]. Frontiers of Information Technology & Electronic Engineering, 2018, 19(5): 583-603.
|
[22] |
ROYCE D. The Art of Network Penetration Test[M] Beijing: Beijing University of Aeronautics and Astronautics Press, 2022.
|
|
ROYCE D. 网络渗透测试的艺术[M]. 北京: 北京航空航天大学出版社, 2022.
|