P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements
During the past decade, software development has evolved from a rigid, linear process to a highly automated and flexible one, thanks to the emergence of continuous integration and delivery environments. Nowadays, more and more development teams rely on such environments to build their complex projec...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-08-01
|
Series: | Information |
Subjects: | |
Online Access: | https://www.mdpi.com/2078-2489/12/9/357 |
id |
doaj-1a75cbc9d6b349319dc14f602bc89fba |
---|---|
record_format |
Article |
spelling |
doaj-1a75cbc9d6b349319dc14f602bc89fba2021-09-26T00:26:27ZengMDPI AGInformation2078-24892021-08-011235735710.3390/info12090357P2ISE: Preserving Project Integrity in CI/CD Based on Secure ElementsAntonio Muñoz0Aristeidis Farao1Jordy Ryan Casas Correia2Christos Xenakis3Computer Science Department, University of Malaga Campus de Teatinos s/n, 29071 Malaga, SpainDepartment of Digital Systems, University of Piraeus, 18534 Piraeus, GreeceComputer Science Department, University of Malaga Campus de Teatinos s/n, 29071 Malaga, SpainDepartment of Digital Systems, University of Piraeus, 18534 Piraeus, GreeceDuring the past decade, software development has evolved from a rigid, linear process to a highly automated and flexible one, thanks to the emergence of continuous integration and delivery environments. Nowadays, more and more development teams rely on such environments to build their complex projects, as the advantages they offer are numerous. On the security side however, most environments seem to focus on the authentication part, neglecting other critical aspects such as the integrity of the source code and the compiled binaries. To ensure the soundness of a software project, its source code must be secured from malicious modifications. Yet, no method can accurately verify that the integrity of the project’s source code has not been breached. This paper presents P2ISE, a novel integrity preserving tool that provides strong security assertions for developers against attackers. At the heart of P2ISE lies the TPM trusted computing technology which is leveraged to ensure integrity preservation. We have implemented the P2ISE and quantitatively assessed its performance and efficiency.https://www.mdpi.com/2078-2489/12/9/357CI/CD pipelinecode integritytrusted computingTPM |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Antonio Muñoz Aristeidis Farao Jordy Ryan Casas Correia Christos Xenakis |
spellingShingle |
Antonio Muñoz Aristeidis Farao Jordy Ryan Casas Correia Christos Xenakis P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements Information CI/CD pipeline code integrity trusted computing TPM |
author_facet |
Antonio Muñoz Aristeidis Farao Jordy Ryan Casas Correia Christos Xenakis |
author_sort |
Antonio Muñoz |
title |
P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements |
title_short |
P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements |
title_full |
P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements |
title_fullStr |
P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements |
title_full_unstemmed |
P2ISE: Preserving Project Integrity in CI/CD Based on Secure Elements |
title_sort |
p2ise: preserving project integrity in ci/cd based on secure elements |
publisher |
MDPI AG |
series |
Information |
issn |
2078-2489 |
publishDate |
2021-08-01 |
description |
During the past decade, software development has evolved from a rigid, linear process to a highly automated and flexible one, thanks to the emergence of continuous integration and delivery environments. Nowadays, more and more development teams rely on such environments to build their complex projects, as the advantages they offer are numerous. On the security side however, most environments seem to focus on the authentication part, neglecting other critical aspects such as the integrity of the source code and the compiled binaries. To ensure the soundness of a software project, its source code must be secured from malicious modifications. Yet, no method can accurately verify that the integrity of the project’s source code has not been breached. This paper presents P2ISE, a novel integrity preserving tool that provides strong security assertions for developers against attackers. At the heart of P2ISE lies the TPM trusted computing technology which is leveraged to ensure integrity preservation. We have implemented the P2ISE and quantitatively assessed its performance and efficiency. |
topic |
CI/CD pipeline code integrity trusted computing TPM |
url |
https://www.mdpi.com/2078-2489/12/9/357 |
work_keys_str_mv |
AT antoniomunoz p2isepreservingprojectintegrityincicdbasedonsecureelements AT aristeidisfarao p2isepreservingprojectintegrityincicdbasedonsecureelements AT jordyryancasascorreia p2isepreservingprojectintegrityincicdbasedonsecureelements AT christosxenakis p2isepreservingprojectintegrityincicdbasedonsecureelements |
_version_ |
1717366131596984320 |