Article currently in progress.

Objective

Building a graph-based system to identify and profile software supply chain threat actors by correlating their digital identities across platforms with vulnerable data in open-source software.

Review of past group’s work

Current Field State

Literature review

Ideas