Figure 4: Codebases targeted
Third-Party Application
OSS
Attacker Application
Third-Party Firmware
Other
Third-Party
Application
47
OSS
25
Attacker
Application
24
Third-Party
Firmware
15
Other
30