Under Submission: Trusted Software, hidden threats: Multi-Vector Supply Chain Attacks Using Coordinated and Independent Components in Small SatellitePublished in [TBD], 2026ABSTRACTUnder SubmissionShare on LinkedIn X (formerly Twitter) Previous Next