Trusting Software: Malicious Code Analyses

Additionally, malicious code can be introduced during the distribution of the software. The distribution environment does not usually fall within the bounds of malicious code analyses, but it is important to note that the security of the distribution channel must be addressed in order to obtain the full benefit of malicious code analyses. ................
................