home.social

#softwarebillofmaterials — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #softwarebillofmaterials, aggregated by home.social.

  1. Global Agencies Unveil AI Supply Chain Risk Guidance with SBOMs

    Global agencies have joined forces to release groundbreaking guidance on AI supply chain risk, outlining minimum elements for Software Bill of Materials (SBOMs) to enhance security and transparency. This crucial step forward aims to tackle the complex challenges of measuring and defining AI risks across organizations.

    osintsights.com/global-agencie

    #AiSupplyChain #SoftwareBillOfMaterials #Sbom #ArtificialIntelligence #G7

  2. G7 Guidance Sets AI Security Standards

    The G7 has set a new benchmark for AI security with the release of voluntary guidelines, outlining the minimum requirements for transparency around AI system components. This move aims to establish a common baseline for the industry, promoting trust and safety in the rapidly evolving AI landscape.

    osintsights.com/g7-guidance-se

    #AiSecurity #G7 #Cisa #ArtificialIntelligence #SoftwareBillOfMaterials

  3. CW: research review

    Here we go again! This time we have a couple of interesting papers on blockchain-related vulnerabilities, an attack against a lightweight stream cipher, an attack against key-store values, a little something about how hard SBOM¹ can be and a couple of hardware security papers.

    * "An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities in Ethereum Smart Contracts"
    * "Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack"
    * "Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure"
    * "How to Bind Anonymous Credentials to Humans"
    * "Challenges of Producing Software Bill Of Materials for Java"
    * "Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol"
    * "The curious case of the half-half Bitcoin ECDSA nonces"
    * "X-ray: Discovering DRAM Internal Structure and Error Characteristics by Issuing Memory Commands"
    * "Benchmarking and modeling of analog and digital SRAM in-memory computing architectures"
    * "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels"

    #Ethereum #Solidity #WG7 #Cryptography #KeyStore #Privacy #AnonymousCredentials #SBOM #Java #SoftwareBillOfMaterials #WhatsApp #E2E #Bitcoin #EDCSA #DRAM #SRAM #SideChannelAttacks

    __
    ¹ Software Bill Of Materials.

  4. CW: research review

    Here we go again! This time we have a couple of interesting papers on blockchain-related vulnerabilities, an attack against a lightweight stream cipher, an attack against key-store values, a little something about how hard SBOM¹ can be and a couple of hardware security papers.

    * "An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities in Ethereum Smart Contracts"
    * "Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack"
    * "Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure"
    * "How to Bind Anonymous Credentials to Humans"
    * "Challenges of Producing Software Bill Of Materials for Java"
    * "Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol"
    * "The curious case of the half-half Bitcoin ECDSA nonces"
    * "X-ray: Discovering DRAM Internal Structure and Error Characteristics by Issuing Memory Commands"
    * "Benchmarking and modeling of analog and digital SRAM in-memory computing architectures"
    * "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels"

    #Ethereum #Solidity #WG7 #Cryptography #KeyStore #Privacy #AnonymousCredentials #SBOM #Java #SoftwareBillOfMaterials #WhatsApp #E2E #Bitcoin #EDCSA #DRAM #SRAM #SideChannelAttacks

    __
    ¹ Software Bill Of Materials.

  5. CW: research review

    Here we go again! This time we have a couple of interesting papers on blockchain-related vulnerabilities, an attack against a lightweight stream cipher, an attack against key-store values, a little something about how hard SBOM¹ can be and a couple of hardware security papers.

    * "An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities in Ethereum Smart Contracts"
    * "Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack"
    * "Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure"
    * "How to Bind Anonymous Credentials to Humans"
    * "Challenges of Producing Software Bill Of Materials for Java"
    * "Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol"
    * "The curious case of the half-half Bitcoin ECDSA nonces"
    * "X-ray: Discovering DRAM Internal Structure and Error Characteristics by Issuing Memory Commands"
    * "Benchmarking and modeling of analog and digital SRAM in-memory computing architectures"
    * "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels"

    #Ethereum #Solidity #WG7 #Cryptography #KeyStore #Privacy #AnonymousCredentials #SBOM #Java #SoftwareBillOfMaterials #WhatsApp #E2E #Bitcoin #EDCSA #DRAM #SRAM #SideChannelAttacks

    __
    ¹ Software Bill Of Materials.

  6. CW: research review

    Here we go again! This time we have a couple of interesting papers on blockchain-related vulnerabilities, an attack against a lightweight stream cipher, an attack against key-store values, a little something about how hard SBOM¹ can be and a couple of hardware security papers.

    * "An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities in Ethereum Smart Contracts"
    * "Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack"
    * "Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure"
    * "How to Bind Anonymous Credentials to Humans"
    * "Challenges of Producing Software Bill Of Materials for Java"
    * "Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol"
    * "The curious case of the half-half Bitcoin ECDSA nonces"
    * "X-ray: Discovering DRAM Internal Structure and Error Characteristics by Issuing Memory Commands"
    * "Benchmarking and modeling of analog and digital SRAM in-memory computing architectures"
    * "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels"

    #Ethereum #Solidity #WG7 #Cryptography #KeyStore #Privacy #AnonymousCredentials #SBOM #Java #SoftwareBillOfMaterials #WhatsApp #E2E #Bitcoin #EDCSA #DRAM #SRAM #SideChannelAttacks

    __
    ¹ Software Bill Of Materials.

  7. CW: research review

    Here we go again! This time we have a couple of interesting papers on blockchain-related vulnerabilities, an attack against a lightweight stream cipher, an attack against key-store values, a little something about how hard SBOM¹ can be and a couple of hardware security papers.

    * "An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities in Ethereum Smart Contracts"
    * "Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack"
    * "Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure"
    * "How to Bind Anonymous Credentials to Humans"
    * "Challenges of Producing Software Bill Of Materials for Java"
    * "Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol"
    * "The curious case of the half-half Bitcoin ECDSA nonces"
    * "X-ray: Discovering DRAM Internal Structure and Error Characteristics by Issuing Memory Commands"
    * "Benchmarking and modeling of analog and digital SRAM in-memory computing architectures"
    * "(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels"

    #Ethereum #Solidity #WG7 #Cryptography #KeyStore #Privacy #AnonymousCredentials #SBOM #Java #SoftwareBillOfMaterials #WhatsApp #E2E #Bitcoin #EDCSA #DRAM #SRAM #SideChannelAttacks

    __
    ¹ Software Bill Of Materials.