Skip to main content

Showing 1–2 of 2 results for author: Wheeler, D A

Searching in archive cs. Search in all archives.
.
  1. Countering Trusting Trust through Diverse Double-Compiling

    Authors: David A. Wheeler

    Abstract: An Air Force evaluation of Multics, and Ken Thompson's famous Turing award lecture "Reflections on Trusting Trust," showed that compilers can be subverted to insert malicious Trojan horses into critical software, including themselves. If this attack goes undetected, even complete analysis of a system's source code will not find the malicious code that is running, and methods for detecting this pa… ▽ More

    Submitted 30 April, 2010; originally announced April 2010.

    Comments: 13 pages.

    Journal ref: Proc. of the 21st Annual Computer Security Applications Conference (ACSAC), December 5-9, 2005, Tucson, Arizona, pp. 28-40, Los Alamitos: IEEE Computer Society, ISBN 0-7695-2461-3, ISSN 1063-9527, IEEE Computer Society Order Number P2461.

  2. arXiv:1004.5534  [pdf

    cs.CR cs.PL

    Fully Countering Trusting Trust through Diverse Double-Compiling

    Authors: David A. Wheeler

    Abstract: An Air Force evaluation of Multics, and Ken Thompson's Turing award lecture ("Reflections on Trusting Trust"), showed that compilers can be subverted to insert malicious Trojan horses into critical software, including themselves. If this "trusting trust" attack goes undetected, even complete analysis of a system's source code will not find the malicious code that is running. Previously-known cou… ▽ More

    Submitted 30 April, 2010; originally announced April 2010.

    Comments: PhD dissertation. Accepted by George Mason University, Fairfax, Virginia, USA's Volgenau School of Information Technology and Engineering in 2009. 199 single-side printed pages.