Skip to main navigation Skip to search Skip to main content

What Gets Measured Gets Managed: Mitigating Supply Chain Attacks with a Link Integrity Management System

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The web continues to grow, but dependency-monitoring tools and standards for resource integrity lag behind. Currently, there exists no robust method to verify the integrity of web resources, much less in a generalizable yet performant manner, and supply chains remain one of the most targeted parts of the attack surface of web applications. In this paper, we present the design of LiMS, a transparent system to bootstrap link integrity guarantees in web browsing sessions with minimal overhead. At its core, LiMS uses a set of customizable integrity policies to declare the (un)expected properties of resources, verifies these policies, and enforces them for website visitors. We discuss how basic integrity policies can serve as building blocks for a comprehensive set of integrity policies, while providing guarantees that would be sufficient to defend against recent supply chain attacks detailed by security industry reports. Finally, we evaluate our open-sourced prototype by simulating deployments on a representative sample of 450 domains that are diverse in ranking and category. We find that our proposal offers the ability to bootstrap marked security improvements with an overall overhead of hundreds of milliseconds on initial page loads, and negligible overhead on reloads, regardless of network speeds. In addition, from examining archived data for the sample sites, we find that several of the proposed policy building blocks suit their dependency usage patterns, and would incur minimal administrative overhead.

Original languageEnglish
Title of host publicationCCS 2025 - Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security
PublisherAssociation for Computing Machinery, Inc
Pages3027-3041
Number of pages15
ISBN (Electronic)9798400715259
DOIs
StatePublished - Nov 22 2025
Event32nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2025 - Taipei, Taiwan, Province of China
Duration: Oct 13 2025Oct 17 2025

Publication series

NameCCS 2025 - Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security

Conference

Conference32nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2025
Country/TerritoryTaiwan, Province of China
CityTaipei
Period10/13/2510/17/25

Keywords

  • Browser
  • Policies
  • Service Worker
  • Web Resource Integrity

Fingerprint

Dive into the research topics of 'What Gets Measured Gets Managed: Mitigating Supply Chain Attacks with a Link Integrity Management System'. Together they form a unique fingerprint.

Cite this