Trust in Software Supply Chains: Blockchain-Enabled SBOM and the AIBOM Future

被引:1
作者
Xia, Boming [1 ]
Zhang, Dawen [1 ]
Liu, Yue [1 ]
Lu, Qinghua [1 ]
Xing, Zhenchang [1 ]
Zhu, Liming [1 ]
机构
[1] CSIRO, Data61, Eveleigh, NSW, Australia
来源
PROCEEDINGS 2024 IEEE/ACM 4TH INTERNATIONAL WORKSHOP ON ENGINEERING AND CYBERSECURITY OF CRITICAL SYSTEMS AND 2024 IEEE/ACM SECOND INTERNATIONAL WORKSHOP ON SOFTWARE VULNERABILITY, ENCYCRIS/SVM 2024 | 2024年
关键词
software bill of materials; verifiable credential; selective disclosure;
D O I
10.1145/3643662.3643957
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The robustness of critical infrastructure systems is contingent upon the integrity and transparency of their software supply chains. A Software Bill of Materials (SBOM) is pivotal in this regard, offering an exhaustive inventory of components and dependencies crucial to software development. However, prevalent challenges in SBOM sharing, such as data tampering risks and vendors' reluctance to fully disclose sensitive information, significantly hinder its effective implementation. These challenges pose a notable threat to the security of critical infrastructure and systems where transparency and trust are paramount, underscoring the need for a more secure and flexible mechanism for SBOM sharing. To bridge the gap, this study introduces a blockchain-empowered architecture for SBOM sharing, leveraging verifiable credentials to allow for selective disclosure. This strategy not only heightens security but also offers flexibility. Furthermore, this paper broadens the remit of SBOM to encompass AI systems, thereby coining the term AI Bill of Materials (AIBOM). The advent of AI and its application in critical infrastructure necessitates a nuanced understanding of AI software components, including their origins and interdependencies. The evaluation of our solution indicates the feasibility and flexibility of the proposed SBOM sharing mechanism, positing a solution for safeguarding (AI) software supply chains, which is essential for the resilience and reliability of modern critical infrastructure systems.
引用
收藏
页码:12 / 19
页数:8
相关论文
共 25 条
[1]  
Arenas R, 2018, INT ICE CONF ENG
[2]   DID and VC: Untangling Decentralized Identifiers and Verifiable Credentials for the Web of Trust [J].
Brunner, Clemens ;
Gallersdoerfer, Ulrich ;
Knirsch, Fabian ;
Engel, Dominik ;
Matthes, Florian .
2020 THE 3RD INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY AND APPLICATIONS, ICBTA 2020, 2020, :61-66
[3]  
CycloneDX, 2023, Machine Learning Bill of Materials (ML-BOM)
[4]  
DE LUCA Stefano, 2023, New Product Liability Directive
[5]  
Gebru T, 2021, COMMUN ACM, V64, P86, DOI 10.1145/3458723
[6]   A survey on blockchain technology and its security [J].
Guo, Huaqun ;
Yu, Xingjie .
BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2022, 3 (02)
[7]   A Survey on Supply Chain Security: Application Areas, Security Threats, and Solution Architectures [J].
Hassija, Vikas ;
Chamola, Vinay ;
Gupta, Vatsal ;
Jain, Sarthak ;
Guizani, Nadra .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (08) :6222-6246
[8]   Model Cards for Model Reporting [J].
Mitchell, Margaret ;
Wu, Simone ;
Zaldivar, Andrew ;
Barnes, Parker ;
Vasserman, Lucy ;
Hutchinson, Ben ;
Spitzer, Elena ;
Raji, Inioluwa Deborah ;
Gebru, Timnit .
FAT*'19: PROCEEDINGS OF THE 2019 CONFERENCE ON FAIRNESS, ACCOUNTABILITY, AND TRANSPARENCY, 2019, :220-229
[9]   Blockchain-based Verifiable Credential Sharing with Selective Disclosure [J].
Mukta, Rahma ;
Martens, James ;
Paik, Hye-young ;
Lu, Qinghua ;
Kanhere, Salil S. .
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, :960-967
[10]   reclaimID: Secure, Self-Sovereign Identities using Name Systems and Attribute-Based Encryption [J].
Schanzenbach, Martin ;
Bramm, Georg ;
Schuette, Julian .
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, :946-957