SpackNVD: A Vulnerability Audit Tool for Spack Packages

Tre' R. Jeter, Matthew J. Bobbitt,Barry L. Rountree

2022 IEEE/ACM First International Workshop on Cyber Security in High Performance Computing (S-HPC)(2022)

引用 0|浏览12
暂无评分
摘要
Security models for Linux distro package security and interoperability have traditionally emphasized the use of more recent (more secure) versions at the occasional expense of execution reproducibility. A complementary approach (e.g., Lmod) allows access to multiple sysadmin-approved package versions. Another approach (e.g., Spack) enables a purely user space process for package selection without system administrator oversight. While maximizing reproducibility, there is no user feedback regarding potential security vulnerabilities. We introduce a general security model for package management and our implementation of SpackNVD, a security auditing tool for Spack. Users may query reported vulnerabilities for specific package versions and can prevent installation where the severity score exceeds a threshold. We emphasize this is a tool, not a solution: Spack users are not expected to be security professionals. However, this information may influence Spack concretizer decisions, and enable users to ask support staff about whether specific package versions are appropriate for use.
更多
查看译文
关键词
Common Platform Enumeration,Common Vulnerabilities and Exposure,Common Vulnerability Scoring System,High-Performance Computing,National Vulnerability Database,Package Manager,Security,Spack
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要