1 Introduction
A software supply chain attack can be informally defined as the act of compromising legitimate software packages during their development or distribution phases. The number of such attacks showed a tremendous increase recently. A NIST forum presentation [1] reported seven significant events in 2017 compared to only four during the previous three years. One of the most common attack vectors is injecting malicious malware code [1], [2] into legitimate software packages during or between development and distribution phases, such as upon building or signing. The most prominent example is an infected installation package of the well-known CCleaner [3] application that included a malware deployed in the vendor’s build server [4]. The altered binary file was downloaded by 2.27 million customers, with potentially serious effects ranging from keystrokes recording to stealing secret credentials from users.