Reflections on Trusting Trust
by Ken Thompson
url show details
Details
type: | misc | month: | aug | journal: | CACM | annote: | interesting introductionary paper on why trust is a tricky business. Example given is a trojan horse in login program which eventually is unnoticeable as it's hidden in the compilers binary and not visible in the source anymore ... Appeared also \cite{AshGra86} and in \cite{Dennin90} | volume: | 27 | pages: | 761--763 | abstract: | In his Turing award lecture, Ken Thomson shows that a Trojan horse can be hidden in a compiler; it inserts copies of itself every time either the compiler or the login program is compiled. | number: | 8 | note: | Turing Award lecture |
|
|
You need to log in to add tags and post comments.