A Look in the Mirror: Attacks on Package Managers
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/221609207 A look in the mirror: Attacks on package managers Conference Paper · January 2008 DOI: 10.1145/1455770.1455841 · Source: DBLP CITATIONS READS 18 107 4 authors, including: John H. Hartman The University of Arizona 61 PUBLICATIONS 1,992 CITATIONS SEE PROFILE Some of the authors of this publication are also working on these related projects: Diffuse optical imaging for breast-cancer detection View project All content following this page was uploaded by John H. Hartman on 05 February 2015. The user has requested enhancement of the downloaded file. A Look In the Mirror: Attacks on Package Managers Justin Cappos Justin Samuel Scott Baker John H. Hartman Department of Computer Science, University of Arizona Tucson, AZ 85721, U.S.A. {justin, jsamuel, bakers, jhh}@cs.arizona.edu ABSTRACT systems [1, 2, 3, 21, 22, 25, 26, 28, 31, 32]. Package managers This work studies the security of ten popular package man- provide a privileged, central mechanism for the management agers. These package managers use different security mech- of software on a computer system. As packages are installed anisms that provide varying levels of usability and resilience by the superuser (root), their security is essential to the to attack. We find that, despite their existing security mech- overall security of the computer. anisms, all of these package managers have vulnerabilities This paper evaluates the security of the eight most popu- that can be exploited by a man-in-the-middle or a malicious lar [9, 19] package managers in use on Linux: APT [1], APT- mirror.
[Show full text]