Reflections on Trusting Trust
by Ken Thompson
url show details
Details
number: | 8 | annote: | interesting introductionary paper on why trust is a tricky business. Example given is a trojan horse in login program which eventually is unnoticeable as it's hidden in the compilers binary and not visible in the source anymore ... Appeared also \cite{AshGra86} and in \cite{Dennin90} | pages: | 761--763 | note: | Turing Award lecture | abstract: | In his Turing award lecture, Ken Thomson shows that a Trojan horse can be hidden in a compiler; it inserts copies of itself every time either the compiler or the login program is compiled. | month: | aug | volume: | 27 | type: | misc | journal: | CACM |
|
|
You need to log in to add tags and post comments.