Day 2 - 27 September 2023

10:00AM

(CET)

Plenary: Chairperson’s Welcome

10:10AM

(CET)

Prof. Fabio Massacci

AssureMOSS Project Coordinator

Vrije Universiteit Amsterdam (VUA)

Associated Talks:

10:10AM - Day 2

View Session 1: Continuous Validation and Security Assessment

View Full Info

Riccardo Scandariato

Head of the Institute of Software Security

Hamburg University of Technology (TUHH)

Associated Talks:

10:10AM - Day 2

View Session 1: Continuous Validation and Security Assessment

View Full Info

Piergiorgio Ladisa

Security Researcher PhD Student

SAP Labs France

Associated Talks:

10:10AM - Day 2

View Session 1: Continuous Validation and Security Assessment

View Full Info

Session 1: Continuous Validation and Security Assessment

  • Risk Explorer for Software Supply Chain (Piergiorgio Ladisa from SAP France)

Open-Source Software (OSS) has become pervasive in contemporary applications, often comprising over 90% of the code in commercial software. Its widespread adoption spans the entire technology stack and the various stages of development and operations. Given the intricate nature of the modern software supply chain, malicious actors find numerous entry points to introduce harmful code into open-source components, thereby compromising downstream users.

During this presentation, we introduce the Risk Explorer for Software Supply Chains, a tool enabling interactive exploration of a comprehensive and technology-agnostic taxonomy outlining methods through which attackers introduce malicious code in the software supply chain. We further showcase its practical applications in industrial contexts.

 

  • Security bill of materials and continuous threat analysis (Riccardo Scandariato from TUHH)

Architectural threat and risk analysis is one of the pillars of software security. However, integrating this practice in the context of continuous software development remains as a challenge. In this panel contribution, we will discuss how automatic techniques can be leveraged to seamlessly extract a so-called security bill of materials and to continuously link architectural security properties (as well as issues) to the code base.

 

  • Mandatory updates and EU Regulation (Prof. Fabio Massacci from VU Amsterdam)

The EU is implementing new regulations that require mandatory software updates. These regulations pose a challenge for software companies that need to keep up with the fast-paced development and use of multi-party open software and services. The AssureMOSS project is developing automated techniques to help companies comply with the new regulations and create more secure software.

. Prof. Fabio Massacci, AssureMOSS Project Coordinator, Vrije Universiteit Amsterdam (VUA)
. Riccardo Scandariato, Head of the Institute of Software Security, Hamburg University of Technology (TUHH)
. Piergiorgio Ladisa, Security Researcher PhD Student, SAP Labs France

11:00AM

Coffee break / Panel on stage

11:15AM

(CET)

Elisa Costante

Vice President of Research

Forescout Technologies Inc.

Associated Talks:

11:15AM - Day 2

View Session 2: Code and Runtime Security Analysis with ML

View Full Info

Agathe Blaise

Researcher

THALES SIX

Associated Talks:

11:15AM - Day 2

View Session 2: Code and Runtime Security Analysis with ML

View Full Info

Adriana Freitas

Director Responsible for Research Project

APWG

Associated Talks:

11:15AM - Day 2

View Session 2: Code and Runtime Security Analysis with ML

View Full Info

Maura Pintor

Collaborator

PLURIBUS

Associated Talks:

11:15AM - Day 2

View Session 2: Code and Runtime Security Analysis with ML

View Full Info

Session 2: Code and Runtime Security Analysis with ML

  • Machine Learning techniques and explainability methods for code analysis (Maura Pintor from PLURIBUS)

Machine learning has been successfully used for increasingly complex and critical tasks, achieving high performance and efficiency that would not be possible for human operators. Unfortunately, recent studies have shown that, despite its power, this technology tends to learn spurious correlations from data, making it weak and susceptible to manipulation. Explainability techniques are often used to identify the most relevant features contributing to the decision. In this talk, I will discuss the advantages of using explainability techniques and building on their results to highlight problems in the model design and training.

 

  • Security Analysis of cloud infrastructure (Agathe Blaise from THALES)

In recent years, there has been an explosion of attacks directed at microservice-based platforms – a trend that follows closely the massive shift of the digital industries towards these environments. Two main  types of approaches exist to provide a security assessment of deployed applications and services in such environments. The first one focuses on the mechanisms for analysis and validation of container images and orchestration deployment descriptions via static analysis and stress test procedures. The second one aims to provide methodologies to ensure the right behavior of microservices while in execution and eventually to detect anomalies in their behavior.

 

  • ML and Generative AI to address complexities surrounding supply chain vulnerabilities (Elisa Costante from FORESCOUT TECHNOLOGIES INC.):

Software supply chain vulnerabilities refer to security flaws within components that are integrated into various other software components and applications. These vulnerabilities pose significant challenges when it comes to identification and understanding their full scope upon disclosure. Particularly, in the context of lengthy supply chains, such as when a TCP/IP stack is utilized within an operating system, which is then incorporated into a Network Management Card, ultimately used in an Uninterruptible Power Supply (UPS), pinpointing affected products can be a time-consuming endeavor, often yielding only partial solutions. As a consequence, certain vendors may remain unaware of whether their products are impacted for an extended period following the initial disclosure of the vulnerability. In this presentation, I will delve into the complexities surrounding supply chain vulnerabilities and explore potential solutions leveraging Machine Learning (ML) and Generative AI to address some of these challenges.

 

  • LAZARUS – Enhancing Software Security (Adriana Freitas from APWG):

Discover how LAZARUS revolutionizes software security through advanced machine learning. Learn about its innovative cybersecurity approach throughout the software development lifecycle, including targeted security checks and valuable intelligence collection. Join us to witness LAZARUS bringing security to every step of software development SDLC.

. Elisa Costante, Vice President of Research, Forescout Technologies Inc.
. Agathe Blaise, Researcher, THALES SIX
. Adriana Freitas, Director Responsible for Research Project, APWG
. Maura Pintor, Collaborator, PLURIBUS

12:15PM

(CET)

Networking session