You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Consider if supply chain attacks on a compiler itself are within the scope of the book. For example, compilers are widely deployed and so could be an attractive target for an attacker to insert code into the compiler to do bad things. Attacks can occur at source level or in the distribution of binaries.
The text was updated successfully, but these errors were encountered:
Consider if supply chain attacks on a compiler itself are within the scope of the book. For example, compilers are widely deployed and so could be an attractive target for an attacker to insert code into the compiler to do bad things. Attacks can occur at source level or in the distribution of binaries.
The text was updated successfully, but these errors were encountered: