Invisible implants in source code
Researchers from Cambridge describe the Trojan Source method for inserting hidden implants in source code.