Lesson 15: Trusting Trust
Outline:
- Quiz #5
- Compilation steps
- Self-reproducing programs (quines)
- Paper Discussion: Reflections on Trusting Trust by Ken Thompson
Curious for more?
Read about how to counter the Trusting Trust attack.
Also read up on supply chain attacks and the Solar Winds attack in particular.
Another type of attack occurred last year, related to the XZ Utils package. There is a slightly related XKCD on software dependencies.
Reading assignment (to be completed by the next class):
- DiS Sec. 7.3: Additional Arithmetic Instructions
- Re-read Dis Sec. 7.2 for its example with the stack
If you haven’t already: