Tag: how is the software controlled by the attacker?