International Journal of Artificial Intelligence and Machine Learning
|
| Volume 5, Issue 2, July 2025 | |
| Research PaperOpenAccess | |
A Secure and Integrated Approach to Software Code and Docker Image Signing: Introducing the Hybrid Chain of Trust (HCoT) Algorithm |
|
1Purdue University Global, West Lafayette, IN, USA, 47906. E-mail: jamshirqureshi@alumni.purdue.edu
*Corresponding Author | |
| Int.Artif.Intell.&Mach.Learn. 5(2) (2025) 16-22, DOI: https://doi.org/10.51483/IJAIML.5.2.2025.16-22 | |
| Received: 17/02/2025|Accepted: 26/06/2025|Published: 25/07/2025 |
Securing the software supply chain is critical in an increasingly interconnected development environment, and vulnerabilities can have implications at a widespread level. Hybrid Chain of Trust (HCoT) algorithm, a proposed new solution, integrates cutting-edge technology to address such concerns. AI facilitated code analysis in HCoT identifies a broader range of vulnerabilities compared to traditional methods. HCoT simplifies workflows through aggregation of code and image signatures under a single, unified process. HCoT also introduces transparency to the software delivery pipeline through having recordable, verifiable proofs of vulnerability and integrity of code. With these, security professionals and developers can make trust in software delivered to them a reality.
Keywords: HCoT algorithm, Securing software, AI facilitated code, Vulnerabilities, Integrity of code
| Full text | Download |
Copyright © SvedbergOpen. All rights reserved

