lkakohio.blogg.se

Tor project replace fragile code with
Tor project replace fragile code with




tor project replace fragile code with

If this “trusting trust” attack goes undetected,Įven complete analysis of a system’s source code will not find the On Trusting Trust”), showed that compilers canīe subverted to insert malicious Trojan horses into critical software, The presentation materials are also available inįairfax, Virginia, Innovation Hall, room 105Īn Air Force evaluation of Multics, and Ken Thompson’s Turing award This presentation was given on November 23, 2009, 1-3pm Of my official public defense is also available This dissertation was accepted by my PhD committee on October 26, 2009. “trusting trust” attack by using the “Diverse Double-Compiling” (DDC) Is my 2009 PhD dissertation explaining how to counter the Real-world application of DDC, specificallyįully Countering Trusting Trust through Diverse Double-Compiling Software patents and application programmer interface (API) copyrights, Thankfully, I think there is an effective countermeasure, which I have namedĭetailed data (to duplicate the experiments), Up to now it’s been presumed to be the essential uncounterable attack.Įssentially since Ken Thompson publicly described it.Īfter all, if there’s a known attack that cannotīe effectively countered, should we be using computers at all? The “Trusting Trust” attack is an incredibly nasty attack in computer security Here’s information about my work to counter the “Trusting Trust” attack.

tor project replace fragile code with

Wheeler’s Page on Fully Countering Trusting Trust through Diverse Double-Compiling (DDC) - Countering Trojan Horse attacks on Compilers Fully Countering Trusting Trust through Diverse Double-Compiling (DDC) - Countering Trojan Horse attacks on Compilers David A.






Tor project replace fragile code with