Lines Matching refs:project
9 software product (open-source project). These include:
11 - Malicious code commits: This attack directly injects code into a project
16 project through other piece of code or packages the project depends on. This
26 TF-A project.
31 Figure 1 shows the different software components surrounding the TF-A project.
49 compiler infrastructure project [3]_. We import the builtins library which
115 - *EDK2 UEFI*: Normal world bootloader from the EDK2 project [7]_. We use EDK2
124 The TF-A project uses several tools to build, analyze and test the TF-A source
267 | Threat and | | According to the TF project maintenance process [10]_, |
270 | | include being an active member of the project for a |
644 | | | project approver | |
657 | | the official | UI per-project | |
713 | | per project is | with password | access list up |