Loading [MathJax]/extensions/tex2jax.js

Everyone for Themselves? A Qualitative Study about Individual Security Setups of Open Source Software Contributors

Research output: Chapter in book/report/conference proceedingConference contributionResearchpeer review

Authors

  • Sabrina Amft
  • Sandra Höltervennhoff
  • Rebecca Panskus
  • Karola Marky
  • Sascha Fahl

Research Organisations

External Research Organisations

  • CISPA Helmholtz Center for Information Security
  • Ruhr-Universität Bochum
Plum Print visual indicator of research metrics
  • Citations
    • Citation Indexes: 4
  • Captures
    • Readers: 4
see details

Details

Original languageEnglish
Title of host publicationProceedings - 45th IEEE Symposium on Security and Privacy, SP 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1065-1082
Number of pages18
ISBN (electronic)9798350331301
ISBN (print)979-8-3503-3131-8
Publication statusPublished - 19 May 2024
Event45th IEEE Symposium on Security and Privacy, SP 2024 - San Francisco, United States
Duration: 20 May 202423 May 2024

Publication series

NameProceedings - IEEE Symposium on Security and Privacy
ISSN (Print)1081-6011

Abstract

To increase open-source software supply chain security, protecting the development environment of contributors against attacks is crucial. For example, contributors must protect authentication credentials for software repositories, code-signing keys, and their systems from malware.Previous incidents illustrated that open-source contributors struggle with protecting their development environment. In contrast to companies, open-source software projects cannot easily enforce security guidelines for development environments. Instead, contributors' security setups are likely heterogeneous regarding chosen technologies and strategies.To the best of our knowledge, we perform the first in-depth qualitative investigation of the security of open-source software contributors' individual security setups, their motivation, decision-making, and sentiments, and the potential impact on open-source software supply chain security. Therefore, we conduct 20 semi-structured interviews with a diverse set of experienced contributors to critical open-source software projects.Overall, we find that contributors have a generally high affinity for security. However, security practices are rarely discussed in the community or enforced by projects. Furthermore, we see a strong influence of social mechanisms, such as trust, respect, or politeness, further impeding the sharing of security knowledge and best practices.We conclude our work with a discussion of the impact of our findings on open-source software and supply chain security, and make recommendations for the open-source software community.

ASJC Scopus subject areas

Cite this

Everyone for Themselves? A Qualitative Study about Individual Security Setups of Open Source Software Contributors. / Amft, Sabrina; Höltervennhoff, Sandra; Panskus, Rebecca et al.
Proceedings - 45th IEEE Symposium on Security and Privacy, SP 2024. Institute of Electrical and Electronics Engineers Inc., 2024. p. 1065-1082 (Proceedings - IEEE Symposium on Security and Privacy).

Research output: Chapter in book/report/conference proceedingConference contributionResearchpeer review

Amft, S, Höltervennhoff, S, Panskus, R, Marky, K & Fahl, S 2024, Everyone for Themselves? A Qualitative Study about Individual Security Setups of Open Source Software Contributors. in Proceedings - 45th IEEE Symposium on Security and Privacy, SP 2024. Proceedings - IEEE Symposium on Security and Privacy, Institute of Electrical and Electronics Engineers Inc., pp. 1065-1082, 45th IEEE Symposium on Security and Privacy, SP 2024, San Francisco, United States, 20 May 2024. https://doi.org/10.1109/SP54263.2024.00214
Amft, S., Höltervennhoff, S., Panskus, R., Marky, K., & Fahl, S. (2024). Everyone for Themselves? A Qualitative Study about Individual Security Setups of Open Source Software Contributors. In Proceedings - 45th IEEE Symposium on Security and Privacy, SP 2024 (pp. 1065-1082). (Proceedings - IEEE Symposium on Security and Privacy). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/SP54263.2024.00214
Amft S, Höltervennhoff S, Panskus R, Marky K, Fahl S. Everyone for Themselves? A Qualitative Study about Individual Security Setups of Open Source Software Contributors. In Proceedings - 45th IEEE Symposium on Security and Privacy, SP 2024. Institute of Electrical and Electronics Engineers Inc. 2024. p. 1065-1082. (Proceedings - IEEE Symposium on Security and Privacy). doi: 10.1109/SP54263.2024.00214
Amft, Sabrina ; Höltervennhoff, Sandra ; Panskus, Rebecca et al. / Everyone for Themselves? A Qualitative Study about Individual Security Setups of Open Source Software Contributors. Proceedings - 45th IEEE Symposium on Security and Privacy, SP 2024. Institute of Electrical and Electronics Engineers Inc., 2024. pp. 1065-1082 (Proceedings - IEEE Symposium on Security and Privacy).
Download
@inproceedings{1330cdb54deb44f6b4e89108dfdff178,
title = "Everyone for Themselves?: A Qualitative Study about Individual Security Setups of Open Source Software Contributors",
abstract = "To increase open-source software supply chain security, protecting the development environment of contributors against attacks is crucial. For example, contributors must protect authentication credentials for software repositories, code-signing keys, and their systems from malware.Previous incidents illustrated that open-source contributors struggle with protecting their development environment. In contrast to companies, open-source software projects cannot easily enforce security guidelines for development environments. Instead, contributors' security setups are likely heterogeneous regarding chosen technologies and strategies.To the best of our knowledge, we perform the first in-depth qualitative investigation of the security of open-source software contributors' individual security setups, their motivation, decision-making, and sentiments, and the potential impact on open-source software supply chain security. Therefore, we conduct 20 semi-structured interviews with a diverse set of experienced contributors to critical open-source software projects.Overall, we find that contributors have a generally high affinity for security. However, security practices are rarely discussed in the community or enforced by projects. Furthermore, we see a strong influence of social mechanisms, such as trust, respect, or politeness, further impeding the sharing of security knowledge and best practices.We conclude our work with a discussion of the impact of our findings on open-source software and supply chain security, and make recommendations for the open-source software community.",
author = "Sabrina Amft and Sandra H{\"o}ltervennhoff and Rebecca Panskus and Karola Marky and Sascha Fahl",
note = "Publisher Copyright: {\textcopyright} 2024 IEEE.; 45th IEEE Symposium on Security and Privacy, SP 2024 ; Conference date: 20-05-2024 Through 23-05-2024",
year = "2024",
month = may,
day = "19",
doi = "10.1109/SP54263.2024.00214",
language = "English",
isbn = "979-8-3503-3131-8",
series = "Proceedings - IEEE Symposium on Security and Privacy",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "1065--1082",
booktitle = "Proceedings - 45th IEEE Symposium on Security and Privacy, SP 2024",
address = "United States",

}

Download

TY - GEN

T1 - Everyone for Themselves?

T2 - 45th IEEE Symposium on Security and Privacy, SP 2024

AU - Amft, Sabrina

AU - Höltervennhoff, Sandra

AU - Panskus, Rebecca

AU - Marky, Karola

AU - Fahl, Sascha

N1 - Publisher Copyright: © 2024 IEEE.

PY - 2024/5/19

Y1 - 2024/5/19

N2 - To increase open-source software supply chain security, protecting the development environment of contributors against attacks is crucial. For example, contributors must protect authentication credentials for software repositories, code-signing keys, and their systems from malware.Previous incidents illustrated that open-source contributors struggle with protecting their development environment. In contrast to companies, open-source software projects cannot easily enforce security guidelines for development environments. Instead, contributors' security setups are likely heterogeneous regarding chosen technologies and strategies.To the best of our knowledge, we perform the first in-depth qualitative investigation of the security of open-source software contributors' individual security setups, their motivation, decision-making, and sentiments, and the potential impact on open-source software supply chain security. Therefore, we conduct 20 semi-structured interviews with a diverse set of experienced contributors to critical open-source software projects.Overall, we find that contributors have a generally high affinity for security. However, security practices are rarely discussed in the community or enforced by projects. Furthermore, we see a strong influence of social mechanisms, such as trust, respect, or politeness, further impeding the sharing of security knowledge and best practices.We conclude our work with a discussion of the impact of our findings on open-source software and supply chain security, and make recommendations for the open-source software community.

AB - To increase open-source software supply chain security, protecting the development environment of contributors against attacks is crucial. For example, contributors must protect authentication credentials for software repositories, code-signing keys, and their systems from malware.Previous incidents illustrated that open-source contributors struggle with protecting their development environment. In contrast to companies, open-source software projects cannot easily enforce security guidelines for development environments. Instead, contributors' security setups are likely heterogeneous regarding chosen technologies and strategies.To the best of our knowledge, we perform the first in-depth qualitative investigation of the security of open-source software contributors' individual security setups, their motivation, decision-making, and sentiments, and the potential impact on open-source software supply chain security. Therefore, we conduct 20 semi-structured interviews with a diverse set of experienced contributors to critical open-source software projects.Overall, we find that contributors have a generally high affinity for security. However, security practices are rarely discussed in the community or enforced by projects. Furthermore, we see a strong influence of social mechanisms, such as trust, respect, or politeness, further impeding the sharing of security knowledge and best practices.We conclude our work with a discussion of the impact of our findings on open-source software and supply chain security, and make recommendations for the open-source software community.

UR - http://www.scopus.com/inward/record.url?scp=85200366724&partnerID=8YFLogxK

U2 - 10.1109/SP54263.2024.00214

DO - 10.1109/SP54263.2024.00214

M3 - Conference contribution

AN - SCOPUS:85200366724

SN - 979-8-3503-3131-8

T3 - Proceedings - IEEE Symposium on Security and Privacy

SP - 1065

EP - 1082

BT - Proceedings - 45th IEEE Symposium on Security and Privacy, SP 2024

PB - Institute of Electrical and Electronics Engineers Inc.

Y2 - 20 May 2024 through 23 May 2024

ER -