llsoftsecbook
llsoftsecbook copied to clipboard
Consider incorporation of trojan-source attacks?
Consider inclusion of trojan-source attacks? https://www.trojansource.codes/trojan-source.pdf Possibly may fit into supply chain section.