Software Supply Chain Security: Attacks, Defenses, and the Adoption of Signatures