To implement the attack and delay detection, the attacker should modify both the installer file and the: