Reflections on Trusting Trust
by Ken Thompson
url show details
Details
number: | 8 | journal: | CACM | type: | misc | abstract: | In his Turing award lecture, Ken Thomson shows that a Trojan horse can be hidden in a compiler; it inserts copies of itself every time either the compiler or the login program is compiled. | annote: | interesting introductionary paper on why trust is a tricky business. Example given is a trojan horse in login program which eventually is unnoticeable as it's hidden in the compilers binary and not visible in the source anymore ... Appeared also \cite{AshGra86} and in \cite{Dennin90} | month: | aug | pages: | 761--763 | note: | Turing Award lecture | volume: | 27 |
|
|
You need to log in to add tags and post comments.