Views provided by UsageCounts
Current software supply chains heavily rely on open-source packages hosted in public repositories. Given the popularity of ecosystems like npm and PyPI, malicious users started to spread malware by publishing open-source packages containing malicious code. Recent works apply machine learning techniques to detect malicious packages in the npm ecosystem. However, the scarcity of samples poses a challenge to the application of machine learning techniques in other ecosystems. Despite the differences between JavaScript and Python, the open-source software supply chain attacks targeting such languages show noticeable similarities (e.g., use of installation scripts, obfuscated strings, URLs). In this paper, we present a novel approach that involves a set of language-independent features and the training of models capable of detecting malicious packages in npm and PyPI by capturing their commonalities. This methodology allows us to train models on a diverse dataset encompassing multiple languages, thereby overcoming the challenge of limited sample availability. We evaluate the models both in a controlled experiment (where labels of data are known) and in the wild by scanning newly uploaded packages for both npm and PyPI for 10 days. We find that our approach successfully detects malicious packages for both npm and PyPI. Over an analysis of 31,292 packages, we reported 58 previously unknown malicious packages (38 for npm and 20 for PyPI), which were consequently removed from the respective repositories.
Proceedings of Annual Computer Security Applications Conference (ACSAC '23), December 4--8, 2023, Austin, TX, USA
Open-source security, FOS: Computer and information sciences, Computer Science - Cryptography and Security, [INFO.INFO-SE] Computer Science [cs]/Software Engineering [cs.SE], Malware Detection, [INFO] Computer Science [cs], Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica, Software Engineering (cs.SE), Computer Science - Software Engineering, Open-Source Security, Supply Chain Attacks, Malware detection, Supply chain attacks, Cryptography and Security (cs.CR)
Open-source security, FOS: Computer and information sciences, Computer Science - Cryptography and Security, [INFO.INFO-SE] Computer Science [cs]/Software Engineering [cs.SE], Malware Detection, [INFO] Computer Science [cs], Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica, Software Engineering (cs.SE), Computer Science - Software Engineering, Open-Source Security, Supply Chain Attacks, Malware detection, Supply chain attacks, Cryptography and Security (cs.CR)
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 10 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 10% |
| views | 19 |

Views provided by UsageCounts