Running the “Reflections on Trusting Trust” Compiler (research.swtch.com)
from tedu@inks.tedunangst.com to inks@inks.tedunangst.com on 26 Oct 2023 19:09
https://inks.tedunangst.com/l/5051

In October 1983, 40 years ago this week, Ken Thompson chose supply chain security as the topic for his Turing award lecture, although the specific term wasn’t used back then. (The field of computer science was still young and small enough that the ACM conference where Ken spoke was the “Annual Conference on Computers.”) Ken’s lecture was later published in Communications of the ACM under the title “Reflections on Trusting Trust.” It is a classic paper, and a short one (3 pages); if you haven’t read it yet, you should. This post will still be here when you get back.

In the lecture, Ken explains in three steps how to modify a C compiler binary to insert a backdoor when compiling the “login” program, leaving no trace in the source code. In this post, we will run the backdoored compiler using Ken’s actual code. But first, a brief summary of the important parts of the lecture.

#c #compiler #development #programming #retro #security #turtles #unix

#c #compiler #development #inks #programming #retro #security #turtles #unix

threaded - newest