Lesson 8: Trusting Trust

Outline:

  1. Understanding C programs
  2. Self-reproducing programs (quines)
  3. Paper Discussion: Reflections on Trusting Trust by Ken Thompson

Curious for more?

Read about how to counter the Trusting Trust attack.

Also read up on supply chain attacks and the Solar Winds attack in particular.

Another type of attack occurred recently, related to the XZ Utils package. There is a slightly related XKCD on software dependencies.

Reading assignment (to be completed by the next class):