📚 Literature Review and Academic Background

Context: This document summarizes academic studies on the NPM ecosystem and software supply chain security, key findings, and the project's position within this literature.

1. General Background and Gap Analysis

This study compiles and synthesizes key works, findings, and gaps in the field of Software Supply Chain Attacks (SSCA) in open-source package ecosystems (especially NPM). The goal is to illuminate the path to the question "which nodes should we invest in first at the ecosystem level?" and to strengthen the topological risk framework by linking it with literature.

Our Contribution: A Composite Criticality Score (BRS) that fuses topological measures + usage intensity + maintenance/freshness signals on a directed graph established with official resolution rules on the download-based core (Top 1000) of the last 12 months, and operational priority lists based on it.

2. NPM Network Topology and Fragility

Main Message: Compromise of hub/backbone nodes dramatically increases systemic risk; therefore network-based prioritization is necessary.

3. Dependency Resolution and Propagation

Main Message: Correct resolution rules are a prerequisite for accurately measuring transitive propagation and impacts.

4. Detection Pipeline: ML/Dynamic Analysis and Signatures

Main Message: Detection pipelines are maturing; however, producing a priority scanning queue with a topological pre-filter (BRS) is critical for limited analyst capacity.

5. Maintenance/Recency and Operational Signals

Main Message: When recency and maintenance signals are used together with BRS, they produce actionable investment plans.

6. Policy, Signing, and Integrity

Main Message: Policy/integrity pipeline emphasizes the role of registry managers and signing infrastructure; target lists with BRS feed this pipeline.

7. Synthesis: Gap → Contribution Mapping

Area Current Gap Project's Contribution
Prioritization Lack of operational prioritization criteria at ecosystem level. Behavioral Risk Score (BRS) = 0.35¡btw' + 0.30¡in' + 0.15¡inv_clust' + ...
Detection Detection pipeline not connected with transitive propagation/high-fidelity resolution. Directed graph built with official rules + BRS pre-filter → Priority scanning queue
Policy Policy/integrity and community health signals not operationalized. BRS target lists + TOOD/PFET → Targeted intervention plans

8. Selected References (Summary)

Foundational Works

  1. Backstabber's Knife Collection (Ohm et al., 2020): 174 real cases, attack trees.
  2. Hitchhiker's Guide (Ladisa et al., 2023): 7 ecosystems, 3 installation, 5 runtime techniques.
  3. Small World with High Risks (Zimmermann, 2019): SPOF and maintainer centrality.
  4. The Web of Dependencies (Oldnall, 2017): NPM network evolution, 200K reverse dependency example.

Detection and Analysis

  1. DVGraph/DTResolver (Liu, 2022): Precise dependency resolution.
  2. Amalfi (2022), Cerebro (2023), OSCAR (2024): Automated detection systems.

Maintenance and Security

  1. Dependency Update Practice (Rahman, 2024): Recency metrics (TOOD/PFET).
  2. in-toto (Torres-Arias, 2020): Supply chain integrity.