Software Distribution Transparency and Auditability

11/20/2017
by   Benjamin Hof, et al.
0

A large user base relies on software updates provided through package managers. This provides a unique lever for improving the security of the software update process. We propose a transparency system for software updates and implement it for a widely deployed Linux package manager, namely APT. Our system is capable of detecting targeted backdoors without producing overhead for maintainers. In addition, in our system, the availability of source code is ensured, the binding between source and binary code is verified using reproducible builds, and the maintainer responsible for distributing a specific package can be identified. We describe a novel "hidden version" attack against current software transparency systems and propose as well as integrate a suitable defense. To address equivocation attacks by the transparency log server, we introduce tree root cross logging, where the log's Merkle tree root is submitted into a separately operated log server. This significantly relaxes the inter-operator cooperation requirements compared to other systems. Our implementation is evaluated by replaying over 3000 updates of the Debian operating system over the course of two years, demonstrating its viability and identifying numerous irregularities.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/22/2017

Contour: A Practical System for Binary Transparency

Transparency is crucial in security-critical applications that rely on a...
research
06/28/2022

Building a Secure Software Supply Chain with GNU Guix

The software supply chain is becoming a widespread analogy to designate ...
research
09/20/2022

Toward Identification and Characterization of IoT Software Update Practices

Software update systems are critical for ensuring systems remain free of...
research
01/13/2020

Characterizing the Root Landscape of Certificate Transparency Logs

Internet security and privacy stand on the trustworthiness of public cer...
research
06/11/2018

CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain

In conventional PKI, CAs are assumed to be fully trusted. However, in pr...
research
11/04/2022

Rescuing the End-user systems from Vulnerable Applications using Virtualization Techniques

In systems owned by normal end-users, many times security attacks are mo...

Please sign up or login with your details

Forgot password? Click here to reset