Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

SCA Tools - SCRM Value Add or Lossy Noise Machines

Conference ·
OSTI ID:2479528

Software supply chain risk management (SCRM) depends upon accurate information regarding the software components that comprise any given software system. The collection of components included in a software package can be organized within a software bill of materials, or SBOM. SBOMs are ideally generated when the software components are put together, such as at compile time, but for many reasons that has not and is not always possible. For example, legacy or proprietary software packages often do not have SBOMs available to downstream consumers of that software. It’s not just end users that are affected, manufacturers themselves also must deal with this problem. To answer these questions, the market has seen the rise of several commercial software composition analysis (SCA) tools. These tools aim to peer into completed software systems, automatically identifying hidden software dependencies and looking up known vulnerabilities associated with those dependencies to enable end-users to enhance their cyber supply chain risk management processes. These tools are potentially a huge boon to end users of legacy and proprietary software – and a potential bane, depending on how accurate they are. This research asks that question – how accurate are currently available binary SCA tools – and provides answers to several other questions: What does it mean to be “accurate”? What limitations do the tools have in identifying common edge cases that take place in modern software development? Can they help you avoid a devastating supply chain attack, or is it all just noise? After researching SCA tools on the market, we identified three vendors that fit our use case and would provide analysis on compiled binaries. Using these tools, we submitted firmware for critical infrastructure devices for analysis and SBOM generation. The SBOM outputs were then cross referenced with SBOMs generated through manual analysis for comparison. In addition to the firmware samples, we also submitted edge case samples based off a popular open-source library that were specifically crafted to evaluate each tools’ ability to accurately identify components. These samples were customized to be consistent with modifications we have seen in modern software development as well as a couple that are representative of supply chain attacks.

Research Organization:
Idaho National Laboratory (INL), Idaho Falls, ID (United States)
Sponsoring Organization:
79
DOE Contract Number:
AC07-05ID14517
OSTI ID:
2479528
Report Number(s):
INL/CON-24-81419-Rev000
Country of Publication:
United States
Language:
English

Similar Records

EyeON
Software · Wed Aug 30 20:00:00 EDT 2023 · OSTI ID:code-149447

Evaluating Methods of Software Bill of Materials Generation to Enhance Nuclear Power Plant Cybersecurity
Journal Article · Wed Sep 18 00:00:00 EDT 2024 · Nuclear Technology · OSTI ID:2587599

Towards Software Bill of Materials in the Nuclear Industry
Technical Report · Thu Sep 01 00:00:00 EDT 2022 · OSTI ID:1901825