SUPPLY CHAIN ATTACK DETECTION THROUGH LIFECYCLE-AWARE ANOMALY SYSTEMS: INTEGRATION OF END-OF-LIFE CONTEXT FOR IDENTIFYING MAINTENANCE TRANSITION ANOMALIES

Authors

DOI:

https://doi.org/10.30888/2663-5712.2026-35-01-117

Keywords:

supply chain attack, anomaly detection, End-of-Life, OpenEoX, lifecycle transition, fork succession, package hijacking, behavioral analysis, SBOM security

Abstract

Supply chain attacks targeting software dependencies represent an escalating threat vector, with adversaries increasingly exploiting lifecycle transitions-particularly End-of-Life (EoL) and maintenance handover events-to introduce malicious code into trus

Published

2026-01-30

How to Cite

Дем’янчук, С., Мартиненко, Р., & Лопухович, В. (2026). SUPPLY CHAIN ATTACK DETECTION THROUGH LIFECYCLE-AWARE ANOMALY SYSTEMS: INTEGRATION OF END-OF-LIFE CONTEXT FOR IDENTIFYING MAINTENANCE TRANSITION ANOMALIES. SWorldJournal, 1(35-01), 229–240. https://doi.org/10.30888/2663-5712.2026-35-01-117

Issue

Section

Articles