CC BY 4.0Heinl, Michael P.Michael P.HeinlEmbacher, Victor ChristianVictor ChristianEmbacher2025-09-112025-09-112024-11-22https://publica.fraunhofer.de/handle/publica/495145https://doi.org/10.24406/publica-539510.1145/3690134.369481610.24406/publica-53952-s2.0-85215506999An increasing number of attacks targeting software supply chains poses a significant threat to software-reliant systems such as Operational Technology (OT). One noteworthy variant of software supply chain attacks is the circumvention of code signing by utilizing stolen signing keys. Binary Transparency (BT) serves as a mechanism to detect and deter such attacks by mandating that every signed binary is stored in a trusted append-only log. We introduce BT-To-The-X (BT2X) which brings BT to OT. To support retrofitting of computationally less capable devices, BT2X introduces well-defined audit levels and assisting infrastructure. Furthermore, it includes a federated gossiping protocol to detect misbehaving logs presenting inconsistent views to different observers. We implemented BT2X on low-power microcontrollers using Rust and evaluated it with regard to size and performance to demonstrate its practical feasibility.entruecode signingconstrained devicesdefense-in-depthiec 62443software supply chain securitysoftware transparencyBT2X: Multi-Leveled Binary Transparency to Protect the Software Supply Chain of Operational Technologyconference paper