New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
IBM Software Fingerprinting for Supply Chain Security Presentation & Feedback #8
Comments
For convenience, I copied the Q&A captured from the 11/2 meeting minutes: Q: How are you consuming all the software that exists to compute genes? Q: Have you considered how the fingerprint relates to dependencies? Connecting/mapping dependencies via a gene. Q: What is the granularity? What about reordering positioning? Q: How are you handing obfustication generally? What’s the threat model? Q: This seems to apply to malware, have you explored that? |
Is this tool planning to be OSS? |
Recording of the presentation at the 11/2/2022 WG meeting: |
Demo at LF Member Summit 2022 (keynote) at the 52 minute mark "Code Genome" project by JR Rao: |
Thanks for posting this! I'm going to mark this issue as closed, but we can continue to refer to the content here. |
Attached to this issue is the PDF of the presentation given during the Wed. Nov. 2nd meeting (APAC friendly) for review and comment...
OpenSSF Repository WG Presentation.pdf
The text was updated successfully, but these errors were encountered: