A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit <a rel="external noopener" href="https://www.computer.org/csdl/proceedings/hicss/2010/3869/00/10-05-03.pdf">the original URL</a>. The file type is <code>application/pdf</code>.
Supply-Chain Risk Management: Incorporating Security into Software Development
<span title="">2010</span>
<i title="IEEE">
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/zlnwsi4sefbkvlcgv2zcupjqum" style="color: black;">2010 43rd Hawaii International Conference on System Sciences</a>
</i>
As outsourcing and expanded use of commercial off-the-shelf (COTS) products increase, supplychain risk becomes a growing concern for software acquisitions. Supply-chain risks for hardware procurement include manufacturing and delivery disruptions, 1 and the substitution of counterfeit or substandard components. Software supply-chain risks include third-party tampering with a product during development or delivery, and, more likely, a compromise of the software assurance through the introduction
<span class="external-identifiers">
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/hicss.2010.355">doi:10.1109/hicss.2010.355</a>
<a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/hicss/EllisonW10.html">dblp:conf/hicss/EllisonW10</a>
<a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2log5y7v3reqzpcd4zywjzboby">fatcat:2log5y7v3reqzpcd4zywjzboby</a>
</span>
more »
... of software defects. This paper describes practices that address such defects and mechanisms for introducing these practices into the acquisition life cycle. The practices improve the likelihood of predictable behavior by systematically analyzing data flows to identify assumptions and using knowledge of attack patterns and vulnerabilities to analyze behavior under conditions that an attacker might create.
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170830095315/https://www.computer.org/csdl/proceedings/hicss/2010/3869/00/10-05-03.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext">
<button class="ui simple right pointing dropdown compact black labeled icon button serp-button">
<i class="icon ia-icon"></i>
Web Archive
[PDF]
<div class="menu fulltext-thumbnail">
<img src="https://blobs.fatcat.wiki/thumbnail/pdf/41/1a/411a6536c41f2806d61fea3e0f5e87a745f94add.180px.jpg" alt="fulltext thumbnail" loading="lazy">
</div>
</button>
</a>
<a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/hicss.2010.355">
<button class="ui left aligned compact blue labeled icon button serp-button">
<i class="external alternate icon"></i>
ieee.com
</button>
</a>