This work studies the security of ten popular package man-agers. These package managers use different security mech-anisms that provide varying levels of usability and resilience to attack. We find that, despite their existing security mech-anisms, all of these package managers have vulnerabilities that can be exploited by a man-in-the-middle or a malicious mirror. While all current package managers suffer from vul-nerabilities, their security is also positively or negatively im-pacted by the distribution’s security practices. Weaknesses in package managers are more easily exploited when distri-butions use third-party mirrors as official mirrors. We were successful in using false credentials to obtain an official mir-ror on all five of the ...
Program size and complexity have dramatically increased over time. To reduce their workload, develop...
Use of third-party software packages has become increasingly popular in software projects. Reusing s...
Abstract. Many IT departments use remote administration products to configure, monitor, and maintain...
Package management is the task of determining which packages should be installed on a host and then ...
Package management systems play an essential role in pursuing systems dependability by ensuring that...
In this work we analyse five popular commercial password managers for security vulnerabilities. Our ...
Package managers are a common tool for installing, removing, and updating software on modern compute...
Generation and maintenance of security poli-cies is too complex and needs simplification for it to b...
Abstract: A key threat of third-party library dependencies is their potential as a doorway for mali...
Today, a large amount of software products include mecha-nisms to counter software piracy. However, ...
A computer system's security can be compromised in many ways—a denial-of-service attack can make a s...
Python is considered the most popular programming language and offers its own ecosystem for archivin...
A computer system's security can be compromised in many ways a denial-of-service attack can make a s...
Windows Installer has been an integral part of Microsoft Windows for a long time and is the standard...
Vulnerabilities are rapidly increasing everyday, posing a major threat to security products. It is d...
Program size and complexity have dramatically increased over time. To reduce their workload, develop...
Use of third-party software packages has become increasingly popular in software projects. Reusing s...
Abstract. Many IT departments use remote administration products to configure, monitor, and maintain...
Package management is the task of determining which packages should be installed on a host and then ...
Package management systems play an essential role in pursuing systems dependability by ensuring that...
In this work we analyse five popular commercial password managers for security vulnerabilities. Our ...
Package managers are a common tool for installing, removing, and updating software on modern compute...
Generation and maintenance of security poli-cies is too complex and needs simplification for it to b...
Abstract: A key threat of third-party library dependencies is their potential as a doorway for mali...
Today, a large amount of software products include mecha-nisms to counter software piracy. However, ...
A computer system's security can be compromised in many ways—a denial-of-service attack can make a s...
Python is considered the most popular programming language and offers its own ecosystem for archivin...
A computer system's security can be compromised in many ways a denial-of-service attack can make a s...
Windows Installer has been an integral part of Microsoft Windows for a long time and is the standard...
Vulnerabilities are rapidly increasing everyday, posing a major threat to security products. It is d...
Program size and complexity have dramatically increased over time. To reduce their workload, develop...
Use of third-party software packages has become increasingly popular in software projects. Reusing s...
Abstract. Many IT departments use remote administration products to configure, monitor, and maintain...