mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-16 09:34:18 +00:00
![]() Software supply chain attacks aim to inject malicious code into a software product. There are several ways a malicious code can be injected into a software product (open-source project). These include: - Malicious code commits - Malicious dependencies - Malicious toolchains This document provides analysis of software supply chain attack threats for the TF-A project Change-Id: I03545d65a38dc372f3868a16c725b7378640a771 Signed-off-by: Lauren Wehrmeister <lauren.wehrmeister@arm.com> |
||
---|---|---|
.. | ||
index.rst | ||
threat_model.rst | ||
threat_model_arm_cca.rst | ||
threat_model_el3_spm.rst | ||
threat_model_fvp_r.rst | ||
threat_model_fw_update_and_recovery.rst | ||
threat_model_rss_interface.rst |