Day 2 - 27 September 2023
10:00AM
(CET)
Plenary: Chairperson’s Welcome
10:10AM
(CET)
Prof. Fabio Massacci
AssureMOSS Project Coordinator
Vrije Universiteit Amsterdam (VUA)

10:10AM - Day 2
View Session 1: Continuous Validation and Security Assessment
Riccardo Scandariato
Head of the Institute of Software Security
Hamburg University of Technology (TUHH)

10:10AM - Day 2
View Session 1: Continuous Validation and Security Assessment
Piergiorgio Ladisa
Security Researcher PhD Student
SAP Labs France

10:10AM - Day 2
View Session 1: Continuous Validation and Security Assessment
Session 1: Continuous Validation and Security Assessment
- Risk Explorer for Software Supply Chain (Piergiorgio Ladisa from SAP France)
Open-Source Software (OSS) has become pervasive in contemporary applications, often comprising over 90% of the code in commercial software. Its widespread adoption spans the entire technology stack and the various stages of development and operations. Given the intricate nature of the modern software supply chain, malicious actors find numerous entry points to introduce harmful code into open-source components, thereby compromising downstream users.
During this presentation, we introduce the Risk Explorer for Software Supply Chains, a tool enabling interactive exploration of a comprehensive and technology-agnostic taxonomy outlining methods through which attackers introduce malicious code in the software supply chain. We further showcase its practical applications in industrial contexts.
- Security bill of materials and continuous threat analysis (Riccardo Scandariato from TUHH)
Architectural threat and risk analysis is one of the pillars of software security. However, integrating this practice in the context of continuous software development remains as a challenge. In this panel contribution, we will discuss how automatic techniques can be leveraged to seamlessly extract a so-called security bill of materials and to continuously link architectural security properties (as well as issues) to the code base.
- Mandatory updates and EU Regulation (Prof. Fabio Massacci from VU Amsterdam)
The EU is implementing new regulations that require mandatory software updates. These regulations pose a challenge for software companies that need to keep up with the fast-paced development and use of multi-party open software and services. The AssureMOSS project is developing automated techniques to help companies comply with the new regulations and create more secure software.
11:00AM
Coffee break / Panel on stage
11:15AM
(CET)
Elisa Costante
Vice President of Research
Forescout Technologies Inc.

11:15AM - Day 2
View Session 2: Code and Runtime Security Analysis with ML
Agathe Blaise
Researcher
THALES SIX

11:15AM - Day 2
View Session 2: Code and Runtime Security Analysis with ML
Adriana Freitas
Director Responsible for Research Project
APWG

11:15AM - Day 2
View Session 2: Code and Runtime Security Analysis with ML
Maura Pintor
Collaborator
PLURIBUS

11:15AM - Day 2
View Session 2: Code and Runtime Security Analysis with ML
Session 2: Code and Runtime Security Analysis with ML
- Machine Learning techniques and explainability methods for code analysis (Maura Pintor from PLURIBUS)
Machine learning has been successfully used for increasingly complex and critical tasks, achieving high performance and efficiency that would not be possible for human operators. Unfortunately, recent studies have shown that, despite its power, this technology tends to learn spurious correlations from data, making it weak and susceptible to manipulation. Explainability techniques are often used to identify the most relevant features contributing to the decision. In this talk, I will discuss the advantages of using explainability techniques and building on their results to highlight problems in the model design and training.
- Security Analysis of cloud infrastructure (Agathe Blaise from THALES)
In recent years, there has been an explosion of attacks directed at microservice-based platforms – a trend that follows closely the massive shift of the digital industries towards these environments. Two main types of approaches exist to provide a security assessment of deployed applications and services in such environments. The first one focuses on the mechanisms for analysis and validation of container images and orchestration deployment descriptions via static analysis and stress test procedures. The second one aims to provide methodologies to ensure the right behavior of microservices while in execution and eventually to detect anomalies in their behavior.
- ML and Generative AI to address complexities surrounding supply chain vulnerabilities (Elisa Costante from FORESCOUT TECHNOLOGIES INC.):
Software supply chain vulnerabilities refer to security flaws within components that are integrated into various other software components and applications. These vulnerabilities pose significant challenges when it comes to identification and understanding their full scope upon disclosure. Particularly, in the context of lengthy supply chains, such as when a TCP/IP stack is utilized within an operating system, which is then incorporated into a Network Management Card, ultimately used in an Uninterruptible Power Supply (UPS), pinpointing affected products can be a time-consuming endeavor, often yielding only partial solutions. As a consequence, certain vendors may remain unaware of whether their products are impacted for an extended period following the initial disclosure of the vulnerability. In this presentation, I will delve into the complexities surrounding supply chain vulnerabilities and explore potential solutions leveraging Machine Learning (ML) and Generative AI to address some of these challenges.
- LAZARUS – Enhancing Software Security (Adriana Freitas from APWG):
Discover how LAZARUS revolutionizes software security through advanced machine learning. Learn about its innovative cybersecurity approach throughout the software development lifecycle, including targeted security checks and valuable intelligence collection. Join us to witness LAZARUS bringing security to every step of software development SDLC.