4 | -- | 7 | Mary Ellen Zurko. Unusable Security for Attackers [From the Editors] |
8 | -- | 10 | Fabio Massacci, Laurie A. Williams. Software Supply Chain Security [Guest Editors' Introduction] |
12 | -- | 23 | Musard Balliu, Benoit Baudry, Sofia Bobadilla, Mathias Ekstedt, Martin Monperrus, Javier Ron Arteaga, Aman Sharma, Gabriel Skoglund, César Soto-Valero, Martin Wittlinger. Challenges of Producing Software Bill of Materials for Java |
24 | -- | 33 | Ákos Milánkovich, Katja Tuma. Delta Security Certification for Software Supply Chains |
34 | -- | 49 | Piergiorgio Ladisa, Serena Elisa Ponta, Antonino Sabetta, Matias Martinez, Olivier Barais. Journey to the Center of Software Supply Chain Attacks |
50 | -- | 54 | Santiago Torres-Arias, Daniel E. Geer, John Speed Meyers. A Viewpoint on Knowing Software: Bill of Materials Quality When You See It |
55 | -- | 58 | Marcela S. Melara, Santiago Torres-Arias. A Viewpoint on Software Supply Chain Security: Are We Getting Lost in Translation? |
59 | -- | 63 | Marcel Fourné, Dominik Wermke, Sascha Fahl, Yasemin Acar. A Viewpoint on Human Factors in Software Supply Chain Security: A Research Agenda |
64 | -- | 75 | Matthias Eckhart, Andreas Ekelhart, David Allison, Magnus Almgren, Katharina Ceesay-Seitz, Helge Janicke, Simin Nadjm-Tehrani, Awais Rashid, Mark Yampolskiy. Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives |
76 | -- | 88 | Nusrat Zahan, Parth Kanakiya, Brian Hambleton, Shohanuzzaman Shohan, Laurie A. Williams. OpenSSF Scorecard: On the Path Toward Ecosystem-Wide Automated Security Metrics |
90 | -- | 94 | Florian Kerschbaum, Nils Lukas. Privacy-Preserving Machine Learning [Cryptography] |
95 | -- | 96 | Bruce Schneier. Trustworthy AI Means Public AI [Last Word] |