In message <[EMAIL PROTECTED]>, "Kenneth R. van Wyk" writes:
>
>This reminded me of an old class of PC viruses (circa 1992) that evaded
>detection by file scanners by hooking the S-DOS file read interrupt and
>returning the original, uninfected version of infected files whenever a
>program ope
On Wednesday 14 December 2005 16:40, David A. Wheeler wrote:
> I've written a paper on an approach to counter this attack. See:
> "Countering Trusting Trust through Diverse Double-Compiling"
> http://www.acsa-admin.org/2005/abstracts/47.html
Thanks for sharing it here, David.
> Here's the abs
Everyone here should be familiar with Ken Thompson's famous
"Reflections on Trusting Trust." If not, see:
http://www.acm.org/classics/sep95/
The "trusting trust" attack subverts the compiler binary;
if the attacker succeeds, you're doomed. Well, til now.
I've written a paper on an approach to co