{"id":"https://openalex.org/W4308562540","doi":"https://doi.org/10.1145/3560835.3564552","title":"Preventing or Mitigating Adversarial Supply Chain Attacks","display_name":"Preventing or Mitigating Adversarial Supply Chain Attacks","publication_year":2022,"publication_date":"2022-11-08","ids":{"openalex":"https://openalex.org/W4308562540","doi":"https://doi.org/10.1145/3560835.3564552"},"language":"en","primary_location":{"id":"doi:10.1145/3560835.3564552","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3560835.3564552","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://durham-repository.worktribe.com/output/2609797","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017882308","display_name":"Kaspar Rosager Ludvigsen","orcid":"https://orcid.org/0000-0001-7243-2548"},"institutions":[{"id":"https://openalex.org/I181647926","display_name":"University of Strathclyde","ror":"https://ror.org/00n3w3b69","country_code":"GB","type":"education","lineage":["https://openalex.org/I181647926"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Kaspar Rosager Ludvigsen","raw_affiliation_strings":["University of Newcastle and University of Strathclyde, Newcastle and Glasgow, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Newcastle and University of Strathclyde, Newcastle and Glasgow, United Kingdom","institution_ids":["https://openalex.org/I181647926"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089038143","display_name":"Shishir Nagaraja","orcid":"https://orcid.org/0000-0001-7272-0611"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Shishir Nagaraja","raw_affiliation_strings":["University of Newcastle, Newcastle, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Newcastle, Newcastle, United Kingdom","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045866788","display_name":"Angela Daly","orcid":"https://orcid.org/0000-0002-7529-4213"},"institutions":[{"id":"https://openalex.org/I177639307","display_name":"University of Dundee","ror":"https://ror.org/03h2bxq36","country_code":"GB","type":"education","lineage":["https://openalex.org/I177639307"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Angela Daly","raw_affiliation_strings":["University of Dundee, Dundee, United Kingdom"],"affiliations":[{"raw_affiliation_string":"University of Dundee, Dundee, United Kingdom","institution_ids":["https://openalex.org/I177639307"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5017882308"],"corresponding_institution_ids":["https://openalex.org/I181647926"],"apc_list":null,"apc_paid":null,"fwci":4.1642,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.94642197,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"25","last_page":"34"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7783472537994385},{"id":"https://openalex.org/keywords/mandate","display_name":"Mandate","score":0.726637601852417},{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.7195574045181274},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6762564778327942},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.5703023672103882},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.5069308876991272},{"id":"https://openalex.org/keywords/national-security","display_name":"National security","score":0.5011746883392334},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.47539862990379333},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.46545082330703735},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4188659191131592},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4054487347602844},{"id":"https://openalex.org/keywords/law-and-economics","display_name":"Law and economics","score":0.3849823772907257},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.34040746092796326},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.25296932458877563},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.1662052869796753},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.16199994087219238},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.12880650162696838}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7783472537994385},{"id":"https://openalex.org/C2775884135","wikidata":"https://www.wikidata.org/wiki/Q845436","display_name":"Mandate","level":2,"score":0.726637601852417},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.7195574045181274},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6762564778327942},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.5703023672103882},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.5069308876991272},{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.5011746883392334},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.47539862990379333},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.46545082330703735},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4188659191131592},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4054487347602844},{"id":"https://openalex.org/C190253527","wikidata":"https://www.wikidata.org/wiki/Q295354","display_name":"Law and economics","level":1,"score":0.3849823772907257},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.34040746092796326},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.25296932458877563},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.1662052869796753},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.16199994087219238},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.12880650162696838},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3560835.3564552","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3560835.3564552","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses","raw_type":"proceedings-article"},{"id":"pmh:oai:discovery.dundee.ac.uk:openaire_cris_publications/df2421db-cbdb-4c82-8af3-b0c172b5d74d","is_oa":false,"landing_page_url":"https://discovery.dundee.ac.uk/en/publications/df2421db-cbdb-4c82-8af3-b0c172b5d74d","pdf_url":null,"source":{"id":"https://openalex.org/S4306400523","display_name":"Discovery Research Portal (University of Dundee)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I177639307","host_organization_name":"University of Dundee","host_organization_lineage":["https://openalex.org/I177639307"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Ludvigsen, K R, Nagaraja, S & Daly, A 2022, Preventing or mitigating adversarial supply chain attacks : A legal analysis. in SCORED 2022 : Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, co-located with CCS 2022. Association for Computing Machinery, New York, NY, pp. 25-34, 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, SCORED 2022, Los Angeles, United States, 11/11/22. https://doi.org/10.1145/3560835.3564552, https://doi.org/10.1145/3560835.3564552","raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:oai:durham-repository.worktribe.com:2609797","is_oa":true,"landing_page_url":"https://durham-repository.worktribe.com/output/2609797","pdf_url":null,"source":{"id":"https://openalex.org/S4306400188","display_name":"Durham Research Online (Durham University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I190082696","host_organization_name":"Durham University","host_organization_lineage":["https://openalex.org/I190082696"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Presentation / Conference Contribution"}],"best_oa_location":{"id":"pmh:oai:durham-repository.worktribe.com:2609797","is_oa":true,"landing_page_url":"https://durham-repository.worktribe.com/output/2609797","pdf_url":null,"source":{"id":"https://openalex.org/S4306400188","display_name":"Durham Research Online (Durham University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I190082696","host_organization_name":"Durham University","host_organization_lineage":["https://openalex.org/I190082696"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Presentation / Conference Contribution"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W157970610","https://openalex.org/W1570214003","https://openalex.org/W2044411509","https://openalex.org/W2274014671","https://openalex.org/W2329719719","https://openalex.org/W2395989739","https://openalex.org/W2752551227","https://openalex.org/W2769763143","https://openalex.org/W2807812549","https://openalex.org/W2904216358","https://openalex.org/W2933633969","https://openalex.org/W2976423760","https://openalex.org/W2985017442","https://openalex.org/W2998948301","https://openalex.org/W3000279485","https://openalex.org/W3017099204","https://openalex.org/W3030211674","https://openalex.org/W3080818026","https://openalex.org/W3083040676","https://openalex.org/W3084156520","https://openalex.org/W3110877094","https://openalex.org/W3121814628","https://openalex.org/W3131069091","https://openalex.org/W3137674637","https://openalex.org/W3161336129","https://openalex.org/W3162740817","https://openalex.org/W4200316810","https://openalex.org/W4210867254","https://openalex.org/W4210967847","https://openalex.org/W4212913397","https://openalex.org/W4221026845","https://openalex.org/W4221112340","https://openalex.org/W4232976534","https://openalex.org/W4239418324","https://openalex.org/W4242936950","https://openalex.org/W4250990977","https://openalex.org/W4253820569","https://openalex.org/W4280548443","https://openalex.org/W4302286896"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W2126282635","https://openalex.org/W4310988119"],"abstract_inverted_index":{"The":[0,27],"world":[1],"is":[2,148,162],"currently":[3],"strongly":[4],"connected":[5],"through":[6],"both":[7,36],"the":[8,14,67,104,121,127,150],"internet":[9],"at":[10,47,58,97,174],"large,":[11],"but":[12],"also":[13],"very":[15],"supply":[16,28,132],"chains":[17,29],"which":[18,43,90],"provide":[19],"everything":[20,137],"from":[21],"food":[22],"to":[23,33,65,94,135,141,164,181],"infrastructure":[24],"and":[25,40,75,79,115,153],"technology.":[26],"are":[30,110],"themselves":[31],"vulnerable":[32],"adversarial":[34],"attacks,":[35],"in":[37,130,138],"a":[38,56],"digital":[39],"physical":[41],"sense,":[42],"can":[44,82],"disrupt":[45],"or":[46,86,118],"worst":[48],"destroy":[49],"them.":[50,143],"In":[51],"this":[52,158],"paper,":[53],"we":[54],"take":[55],"look":[57],"two":[59],"examples":[60],"of":[61,69,107,157],"such":[62],"successful":[63],"attacks":[64,85,134],"put":[66],"idea":[68],"Supply":[70],"Chain":[71],"Attacks":[72],"into":[73],"perspective,":[74],"analyse":[76],"how":[77],"EU":[78,146],"national":[80,108,170],"law":[81,147,171],"prevent":[83],"these":[84,166],"otherwise":[87,119],"punish":[88],"companies":[89,177],"do":[91,136],"not":[92,111],"try":[93],"mitigate":[95,142],"them":[96],"all":[98],"possible":[99],"costs.":[100],"We":[101],"find":[102],"that":[103],"current":[105,145],"types":[106],"regulation":[109],"technology":[112],"specific":[113],"enough,":[114],"cannot":[116],"force":[117],"mandate":[120],"correct":[122],"parties":[123],"who":[124],"could":[125],"play":[126],"biggest":[128],"role":[129],"preventing":[131],"chain":[133],"their":[139],"power":[140],"But,":[144],"on":[149],"right":[151],"path,":[152],"further":[154],"\\textcolorblack":[155],"development":[156],"may":[159,172],"be":[160],"what":[161],"necessary":[163],"combat":[165],"large":[167],"threats,":[168],"as":[169],"fail":[173],"properly":[175],"regulating":[176],"when":[178],"it":[179],"comes":[180],"cybersecurity.":[182]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":3}],"updated_date":"2026-03-16T09:10:04.655348","created_date":"2022-11-12T00:00:00"}
