Главная
Study mode:
on
1
Intro
2
Backstory
3
Am I safe
4
Sbombs
5
What is Trust
6
Time dependent
7
Build process
8
Deep scanning
9
Build tools
10
What is a build tool
11
Compilers
12
Linkers
13
Shared Objects
14
Code Generators
15
RPM Files
16
Polyglot
17
Artifacts
18
Nonsolutions
19
Minimum elements
20
Minimum identifiers
21
How to identify things
22
Git
23
Object IDs
24
Generalizing
25
Input manifest
26
Input manifest identifier
27
Embed input manifest identifier in output artifacts
28
Artifact dependency graph
29
Merkle tree
30
OmniBOR
31
OmniBOR Community
32
What is an Sbomb
33
cbes
34
patch
35
response teams
36
questions
37
open database
38
artifact dependency graphs
39
call your supplier
40
other questions
41
adoption tooling
42
call for action
43
hash
44
sha
45
the blog post
46
the build tool
47
broken reproducibility
Description:
Explore a comprehensive conference talk on OmniBOR, a revolutionary approach to supply chain security. Learn how to capture the full artifact dependency graph of software as an output of build tools, addressing challenges with SBOM scanners and false positives. Discover the concept of artifact dependency graphs, Merkle trees, and the minimum elements required for effective software identification. Gain insights into the OmniBOR community, its potential impact on SBOMs, and the future of build tool integration. Understand the importance of reproducibility and hash functions in software security. Engage with discussions on adoption tooling, practical applications, and the call to action for implementing this innovative solution in software development processes.

OmniBOR: Bringing the Receipts for Supply Chain Security

Linux Foundation
Add to list
0:00 / 0:00