I stumbled upon a talk from GRCon18 a few weeks ago where they did this [1], though on a much more restricted testcase.
Find the idea interesting, but I'm curious how resistant it is to attackers who know you are using it / how you'd design things to make backdooring in a way that isn't noticeable hard.
Find the idea interesting, but I'm curious how resistant it is to attackers who know you are using it / how you'd design things to make backdooring in a way that isn't noticeable hard.
[1] https://www.youtube.com/watch?v=gDGzc_4wcjM