A Foot in the Backdoor

Richard Bondi
Ruben Barroso
Garrett Holthaus
John P. Thomas
(2025)
Google Scholar

Abstract

We applied systems theory control loops to the 2024 cyberattack https://nvd.nist.gov/vuln/detail/CVE-2024-3094, in which a backdoor was inserted into Linux distros by modifying the xz utils compression package. Our work illustrates how to apply STAMP, CAST, and STPA to cyberattacks, and advantages over traditional threat modeling.
×