Verified runtime fingerprints to eliminate zero day software supply chain attacks | RAD Security