Welcome to the 5th KTH Workshop on the Software Supply Chain in Stockholm, Sweden. This workshop is organized in the context of the CHAINS research project.
| Time | Event |
|---|---|
| 8h30 | Welcome coffee |
| 9h | Opening (XX) |
| 9h15 | Justin Cappos, SBOMs Are No Longer Mandatory Which Is A Good Thing” and Other Opinionated Software Supply Chain Observations |
| 10h15 | break + poster |
| 10h45 | Peter Andersson, “Chainguard, the safe source for open source”, Chainguard |
| 11h15 | Olle E. Johansson, “The Open Source community prepares for the CRA. Where’s the industry?”, Edvina |
| 11h45 | Niels Möller, “The Sigsum transparency system”, Glasklar Teknik AB |
| 12h15 | Lunch |
| 14h | Andrew Nesbitt, “TBD”, Ecosyste.ms |
| 14h30 | Cesar Soto-Valero, “TBD”, SEB Group |
| 14h45 | Mojtaba Moazen, “TBD”, KTH Royal Institute of Technology |
| 15h15 | Break + poster |
| 15h45 | Chains PhD Festival (5min per Chains PhD student) |
| 16h15 | Musard Balliu, “TBD”, KTH Royal Institute of Technology |
| 17h | Closing (XX) |

Abstract: Software supply chain security has moved from a niche problem to a critical part of modern software infrastructure. However, that does not mean that it is well understood overall. This keynote focuses on a number of common misconceptions about security in the software supply chain. I will take a position on topics such as “Security might improve now that SBOMs are no longer mandated”, “Integrating Sigstore provides less protection against compromise than you might expect”, “Signing software updates with Notation or similar technologies provides little security benefit”, “Signing Git commits provides only small security value in practice”, and “Reproducible builds are a religion (not a science), but you should join!”. Pointed questions / rebuttals from the audience are welcome!
Speaker Bio: Justin Cappos is a professor in the Computer Science and Engineering Department at New York University. He is a creator of a variety of widely used software supply chain technologies, including TUF, Uptane, gittuf, and in-toto. Working with his collaborators, he has also contributed to security architectures used in Git, reproducible builds, major Linux package managers, popular programming language ecosystems, legal repositories, automobiles, and more. Due to the depth and breadth of these contributions — along with, perhaps, a few gray hairs — he is, to his surprise, sometimes given the moniker “father of software supply chain security”.
List of posters:
TBD