Making Secure Software Insecure without Changing Its Code: The Possibilities and Impacts of Attacks on the DevOps Pipeline.
Nicholas PeckaLotfi Ben OthmaneAltaz ValaniPublished in: CoRR (2022)
Keyphrases
- source code
- security mechanisms
- stream cipher
- security protocols
- software systems
- sql injection
- chosen plaintext
- security flaws
- authentication scheme
- software development
- authentication protocol
- program understanding
- secure routing
- security issues
- software maintenance
- static analysis
- security vulnerabilities
- unauthorized access
- software architecture
- countermeasures
- secret key
- code snippets
- key distribution
- cryptographic protocols
- malicious code
- computer systems
- security risks
- diffie hellman
- application programming interface
- fully functional
- open source
- key management
- access control
- private key
- user authentication
- control flow
- standard model
- watermarking technique
- protection schemes
- cryptographic algorithms
- watermarking scheme
- security measures
- aspect oriented programming
- security threats
- aspect oriented
- block cipher