Lesson 15: Trusting Trust

Outline:

  1. Quiz #5
  2. Compilation steps
  3. Self-reproducing programs (quines)
  4. Paper Discussion: Reflections on Trusting Trust by Ken Thompson

Curious for more?

Read about how to counter the Trusting Trust attack.

Also read up on supply chain attacks and the Solar Winds attack in particular.

Another type of attack occurred last year, related to the XZ Utils package. There is a slightly related XKCD on software dependencies.

Reading assignment (to be completed by the next class):

If you haven’t already: