Invisible implants in source code

Researchers from Cambridge describe the Trojan Source method for inserting hidden implants in source code.