{"id":23230,"date":"2023-03-06T04:47:32","date_gmt":"2023-03-06T04:47:32","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=23230"},"modified":"2026-04-17T18:07:42","modified_gmt":"2026-04-17T18:07:42","slug":"key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\/","title":{"rendered":"Key Technologies for Software Supply Chain Security \u2013 Detection Techniques (Part 1) \u2013 Software Composition Analysis"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p>Software supply chain security detection techniques must cover the software delivery life cycle, including software design, building, testing, and operation. There are mainly five types of security detection techniques, namely software composition analysis (SCA), static application security testing (SAST), dynamic application security testing (DAST), interactive application security testing (IAST), and FUZZ testing. Each of these detection techniques offers solutions to a specific stage of a software supply chain. The following table briefly introduces and compares these five types of techniques.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/Software-Supply-Chain-Security-Detection-Techniques-Sofeware-Composition-Analysis.png\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/Software-Supply-Chain-Security-Detection-Techniques-Sofeware-Composition-Analysis.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-23231\" width=\"809\" height=\"493\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/Software-Supply-Chain-Security-Detection-Techniques-Sofeware-Composition-Analysis.png 922w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/Software-Supply-Chain-Security-Detection-Techniques-Sofeware-Composition-Analysis-300x183.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/Software-Supply-Chain-Security-Detection-Techniques-Sofeware-Composition-Analysis-768x468.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/Software-Supply-Chain-Security-Detection-Techniques-Sofeware-Composition-Analysis-600x366.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/Software-Supply-Chain-Security-Detection-Techniques-Sofeware-Composition-Analysis-200x122.png 200w\" sizes=\"(max-width: 809px) 100vw, 809px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p>We will detail the five detection techniques one by one. Today we are focusing on software composition analysis.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Software Composition Analysis (SCA)<\/strong><\/h2>\n\n\n\n<p>Open-source software is widely used in the software supply chain because of its openness, sharing, and freedom. Wider use of open code significantly improves the efficiency of software development and reduces its cost. However, open-source projects, often of uneven quality, are more exposed to attackers&#8217; malicious tampering due to the existence of security vulnerabilities or maintenance personnel&#8217;s neglect to fix those vulnerabilities. This has posed a serious security problem. Today, with its number growing exponentially, open-source software is becoming more and more interdependent, resulting in huge difficulties in vulnerability identifying using human capabilities alone. Therefore, software composition analysis and vulnerability detection techniques are needed in order to solve this problem in an automatic and efficient way. Software composition analysis (SCA) is one of the most effective techniques of the kind.<\/p>\n\n\n\n<p>SCA is a static, white-box detection technique, which automatically analyzes software&acirc;&euro;&trade;s source codes and binary files to identify its software bill of materials (SBOM) and detect vulnerabilities and compliance risks. Effective detection is the first step towards software security.<\/p>\n\n\n\n<p>From a technical perspective, SCA is a general analysis method that is able to analyze any programming language including but not limited to Java, C\/C++, Golang, Python, and JavaScript. It focuses on third-party artifacts composing software, and the dependencies between them. A single SCA process can be divided into four stages, namely source code\/binary file analysis, feature extraction and identification, vulnerability detection, and SBOM generation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1.<\/strong>  <strong>Source Code\/Binary File Analysis<\/strong><\/h3>\n\n\n\n<p>SCA is featured by a high level of compatibility that works across programming languages. The programs on which SCA performs analysis can either be source code, or all types of compiled binary files. Moreover, SCA takes in various types of digital information regardless of its program architecture or compilation method. Its detection objects include class names, method\/function names, constant strings, etc. on x86 platform or ARM platform as a windows program or a Linux program. The format of a binary analysis is as follows:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/Binary-analysis-2.png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/Binary-analysis-2.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-23237\" width=\"673\" height=\"347\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/Binary-analysis-2.png 833w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/Binary-analysis-2-300x155.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/Binary-analysis-2-768x396.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/Binary-analysis-2-600x310.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/Binary-analysis-2-200x103.png 200w\" sizes=\"(max-width: 673px) 100vw, 673px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>2.  Feature Extraction and Identification<\/strong><\/h3>\n\n\n\n<p>Component identification is the second stage of an SCA process, and it generally adopts two techniques: package manager parsing and fingerprint identification.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Package Manager Parsing<\/li><\/ul>\n\n\n\n<p>SCA obtains information about the composition of certain software directly from package management configuration files in its source codes, such as requirements.txt in the Python project and package.json in the NPM project. Package manager parsing has high implementation effectiveness and efficiency, but might not be suitable for some scenarios. For binary files without a package manager or some binary files, SCA might miss out. C Language is one such example. There is no such thing as a package manager in C Language; instead, it uses source codes of open-source components in its own codes, resulting in the inability of SCA to identify those components. There could also be components without version definitions in some package managers. In this case, SCA is not able to determine the existence of vulnerabilities due to the lack of current version information. That&#8217;s why commercial software usually uses a combination of package manager parsing and fingerprint identification to improve identification coverage.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Fingerprint Identification<\/li><\/ul>\n\n\n\n<p>The fingerprint identification system calculates the eigenvalues of an object file and matches them in the component feature database to identify a component. There are multiple commonly used algorithms to do the calculation; each has different accuracy and efficiency.<\/p>\n\n\n\n<p>      &#8211; Structural fingerprint identification analyzes the structure of a directory to generate fingerprints for similarity comparison, in this way it can identify open-source components.<\/p>\n\n\n\n<p>      &#8211; Fingerprint identification based on feature code is also used to identify open-source components. It does this by identifying features such as hash values or sizes of local files.<\/p>\n\n\n\n<p>      &#8211; Fingerprint identification through the code snippet slices a piece of code into fragments to generate a code fingerprint and identifies components through code fingerprint similarity comparison.<\/p>\n\n\n\n<p>      &#8211; Fingerprint identification through decompilation of binary code identifies components through similarity comparison.<\/p>\n\n\n\n<p>      &#8211;  Fingerprint identification through string searching and customized fingerprint are used to identify components of closed-source software or third-party commercial software.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3.<\/strong>  <strong>Vulnerability Detection<\/strong>  <\/h3>\n\n\n\n<p> Vulnerability detection is the third stage of an SCA process; it matches identified components in the component vulnerability database to detect the existence of vulnerabilities and licensing risks, and offers solutions to customers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4.  SBOM Generation<\/strong><\/h3>\n\n\n\n<p>SBOM provides key information about the composition of and dependencies between components, vulnerabilities, and licensing. It is crucial for transparency in the software supply chain. There are currently three formats for implementing SBOM:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>SPDX: A grassroots effort from the Linux Foundation. The program is an open standard for communicating SBOM information, including components, licenses, copyrights, and security references.<\/li><li>CycloneDX: designed specifically for security contexts and supply chain component analysis.<\/li><li>SWID Tags: composed of files that record unique information about a software component and assist with inventory management initiatives.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/SBOM-generation.png\"><img decoding=\"async\" width=\"1017\" height=\"750\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/SBOM-generation.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-23241\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/SBOM-generation.png 1017w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/SBOM-generation-300x221.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/SBOM-generation-768x566.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/SBOM-generation-600x442.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/03\/SBOM-generation-200x147.png 200w\" sizes=\"(max-width: 1017px) 100vw, 1017px\" \/><\/a><\/figure>\n\n\n\n<p>In recent years, supply chain security problems caused by open-source components and third-party commercial software have been on the rise. Take the recent Log4j and SolarWinds intrusions for example, incidents like these have a great impact on general security due to their high availability and wide application. SCA technique does not require a program; instead, it analyzes the composition of third-party software in a static way to obtain knowledge graphs of the application&#8217;s components, which helps to improve the transparency of the software supply chain. Then it matches the components in the existing list of known vulnerabilities to help users fix problems in time.<\/p>\n\n\n\n<p>Previous posts on software supply chain security:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/software-supply-chain-security-overview\/\" target=\"_blank\" rel=\"noreferrer noopener\">Software Supply Chain Security: Overview<\/a><\/li><li><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/threats-against-software-supply-chain-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threats against Software Supply Chain Security<\/a><\/li><li><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/the-increasing-trend-of-software-supply-chain-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">The Increasing Trend of Software Supply Chain Attacks<\/a><\/li><li><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/the-increasingly-complex-and-varied-vectors-to-attack-software-supply-chain\/\" target=\"_blank\" rel=\"noreferrer noopener\">The Increasingly Complex and Varied Vectors to Attack Software Supply Chain<\/a><\/li><li><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/security-concept-for-software-supply-chain-part-1-transparency-of-software-supply-chain-compositions\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security Concept for Software Supply Chain (Part 1) &acirc;&euro;&rdquo; Transparency of Software Supply Chain Compositions<\/a><\/li><li><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/security-concept-for-software-supply-chain-part-2-assessable-capabilities-of-software-supply-chain-compositions\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security Concept for Software Supply Chain (Part 2) &acirc;&euro;&rdquo; Assessable Capabilities of Software Supply Chain Compositions<\/a><\/li><li><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/security-concept-for-software-supply-chain-part-3-building-trusted-software-supply-chain\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security Concept for Software Supply Chain (Part 3) &acirc;&euro;&ldquo; Building Trusted Software Supply Chain<\/a><\/li><li><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/relationship-between-security-concept-and-security-assessment-for-software-supply-chain\/\">Relationship Between Security Concept and Security Assessment for Software Supply Chain<\/a><\/li><li><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/technical-framework-of-software-supply-chain-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Technical Framework of Software Supply Chain Security<\/a><\/li><li><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/key-technologies-for-software-supply-chain-security-techniques-for-generating-and-using-the-list-of-software-compositions-part-1\/\" target=\"_blank\" rel=\"noreferrer noopener\">Key Technologies for Software Supply Chain Security&acirc;&euro;&rdquo;Techniques for Generating and Using the List of Software Compositions (Part 1)<\/a><\/li><li><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/key-technologies-for-software-supply-chain-security-techniques-for-generating-and-using-the-list-of-software-compositions-part-2\/\" target=\"_blank\" rel=\"noreferrer noopener\">Key Technologies for Software Supply Chain Security&acirc;&euro;&rdquo;Techniques for Generating and Using the List of Software Compositions (Part 2)<\/a><\/li><\/ul>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Software supply chain security detection techniques must cover the software delivery life cycle, including software design, building, testing, and operation. There are mainly five types of security detection techniques, namely software composition analysis (SCA), static application security testing (SAST), dynamic application security testing (DAST), interactive application security testing (IAST), and FUZZ testing. Each of these [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":21776,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[656,675],"class_list":["post-23230","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-software-supply-chain","tag-supply-chain-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Key Technologies for Software Supply Chain Security \u2013 Detection Techniques (Part 1) \u2013 Software Composition Analysis - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Key Technologies for Software Supply Chain Security \u2013 Detection Techniques (Part 1) \u2013 Software Composition Analysis - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Software supply chain security detection techniques must cover the software delivery life cycle, including software design, building, testing, and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-06T04:47:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/Chain-scaled-e1666342354234.jpg\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Key Technologies for Software Supply Chain Security \u2013 Detection Techniques (Part 1) \u2013 Software Composition Analysis - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Software supply chain security detection techniques must cover the software delivery life cycle, including software design, building, testing, and\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/Chain-scaled-e1666342354234.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Key Technologies for Software Supply Chain Security \u2013 Detection Techniques (Part 1) \u2013 Software Composition Analysis\",\"datePublished\":\"2023-03-06T04:47:32+00:00\",\"dateModified\":\"2026-04-17T18:07:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\\\/\"},\"wordCount\":1165,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Chain-scaled-e1666342354234.jpg\",\"keywords\":[\"software supply chain;\",\"supply chain security;\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\\\/\",\"name\":\"Key Technologies for Software Supply Chain Security \u2013 Detection Techniques (Part 1) \u2013 Software Composition Analysis - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Chain-scaled-e1666342354234.jpg\",\"datePublished\":\"2023-03-06T04:47:32+00:00\",\"dateModified\":\"2026-04-17T18:07:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Chain-scaled-e1666342354234.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Chain-scaled-e1666342354234.jpg\",\"width\":300,\"height\":200,\"caption\":\"Chains connected by a paperclip illustration.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Key Technologies for Software Supply Chain Security \u2013 Detection Techniques (Part 1) \u2013 Software Composition Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Key Technologies for Software Supply Chain Security \u2013 Detection Techniques (Part 1) \u2013 Software Composition Analysis - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\/","og_locale":"pt_BR","og_type":"article","og_title":"Key Technologies for Software Supply Chain Security \u2013 Detection Techniques (Part 1) \u2013 Software Composition Analysis - NSFOCUS","og_description":"Software supply chain security detection techniques must cover the software delivery life cycle, including software design, building, testing, and","og_url":"https:\/\/nsfocusglobal.com\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\/","og_site_name":"NSFOCUS","article_published_time":"2023-03-06T04:47:32+00:00","article_modified_time":"2026-04-17T18:07:42+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/Chain-scaled-e1666342354234.jpg","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"Key Technologies for Software Supply Chain Security \u2013 Detection Techniques (Part 1) \u2013 Software Composition Analysis - NSFOCUS","twitter_description":"Software supply chain security detection techniques must cover the software delivery life cycle, including software design, building, testing, and","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/Chain-scaled-e1666342354234.jpg","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Key Technologies for Software Supply Chain Security \u2013 Detection Techniques (Part 1) \u2013 Software Composition Analysis","datePublished":"2023-03-06T04:47:32+00:00","dateModified":"2026-04-17T18:07:42+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\/"},"wordCount":1165,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/Chain-scaled-e1666342354234.jpg","keywords":["software supply chain;","supply chain security;"],"articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\/","url":"https:\/\/nsfocusglobal.com\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\/","name":"Key Technologies for Software Supply Chain Security \u2013 Detection Techniques (Part 1) \u2013 Software Composition Analysis - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/Chain-scaled-e1666342354234.jpg","datePublished":"2023-03-06T04:47:32+00:00","dateModified":"2026-04-17T18:07:42+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/Chain-scaled-e1666342354234.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/10\/Chain-scaled-e1666342354234.jpg","width":300,"height":200,"caption":"Chains connected by a paperclip illustration."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/key-technologies-for-software-supply-chain-security-detection-techniques-part-1-software-composition-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Key Technologies for Software Supply Chain Security \u2013 Detection Techniques (Part 1) \u2013 Software Composition Analysis"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/23230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=23230"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/23230\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/21776"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=23230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=23230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=23230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}