Reflections on Trusting Trust

back to index

description: a lecture by Ken Thompson that discusses the risks in trusting the software and tools one uses, and demonstrates a compiler backdoor.

7 results

Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat

by John P. Carlin and Garrett M. Graff  · 15 Oct 2018  · 568pp  · 164,014 words

/when-did-the-term-compute/. 43. Michelle Slatalla and Joshua Quittner, Masters of Deception: The Gang That Ruled Cyberspace (HarperCollins, 1995), 16. 44. Ken Thompson, “Reflections on Trusting Trust,” Turing Award Lecture, Communications of the ACM, vol. 1, no. 8, 1984, www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf. 45. Linda

Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks

by Scott J. Shapiro  · 523pp  · 154,042 words

obtain national security secrets, personal financial records from financial institutions or credit agencies, and hacking into government computers. devoted his lecture to cybersecurity: Kenneth Thompson, “Reflections on Trusting Trust,” Communications of the ACM, August 1984, https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ ReflectionsonTrustingTrust.pdf. The Turing lecture series was inaugurated in

(PhD diss., George Mason University, 2009), https://dwheeler.com/trusting-trust/dissertation/html/wheeler-trusting-trust-ddc.html. “only program you can truly trust”: Thompson, “Reflections on Trusting Trust.” appearing on: Patrick was also a witness at the congressional cybersecurity hearings. When asked by a member of the subcommittee whether WarGames was an inspiration

Your Computer Is on Fire

by Thomas S. Mullaney, Benjamin Peters, Mar Hicks and Kavita Philip  · 9 Mar 2021  · 661pp  · 156,009 words

.1 In 1983 Thompson received the Turing Award, largely as a result of his work on Unix. In his acceptance speech for this award, titled “Reflections on Trusting Trust,”2 Thompson reminds the audience that he hadn’t worked actively on Unix in many years. After doing this act of performative humility, Thompson devotes

Trojan horse could then use to hijack computer systems on which the software was installed. I will refer to the method that Thompson outlines in “Reflections on Trusting Trust” as the “Thompson hack” for the remainder of this chapter.3 Nevertheless, it is useful to note that what I call the Thompson hack was

deep-layered software stack that allows for the creation of software platforms. The primer on programming language hierarchies is followed by a close read of “Reflections on Trusting Trust.” Although this material is fairly technical, enough apparatus is provided for nonprogramming readers to understand both the key turning points of Thompson’s explanation of

be the programmer who had produced the shortest self-replicating program. The method Thompson used to produce a self-replicating pronoun that he presents in “Reflections on Trusting Trust” is inspired by analytic philosopher W. V. O. Quine’s variant of the liar’s paradox. Most versions of this paradox, like the well-known

C itself as the eighth most widely used language. Github, “Octoverse Report,” accessed August 13, 2020, https://octoverse.github.com/projects#languages. 2. Ken Thompson, “Reflections on Trusting Trust,” Communications of the ACM 27, no. 8 (1984): 761–763. 3. In his recent book Bits to Bitcoin, Mark Stuart Day briefly discusses this attack

/sites/quora/2014/12/05/what-is-a-coders-worst-nightmare/#63aa7fee7bb4. 35. It is, for whatever reason, common to blame students who had read “Reflections on Trusting Trust” for most Thompson hack implementations found in the wild. 36. Delphi is an HLL derived from the earlier language Pascal. 37. Kevin Poulson, “Malware Turns

Telepresence, 5 Terms of usage, 4 Tesla, 45 Tetris, 234–236 Thailand (Thai), 102, 342, 354 Thompson, Ken, 273–275, 277, 286–289, 291–292 “Reflections on Trusting Trust,” 273–274, 278 Thompson hack bootstrapping, 281–284 in real life, 289–291 replication, 278–281 Trojan horse, 284–286 Tiltfactor Lab, 235 T9, 7

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race

by Nicole Perlroth  · 9 Feb 2021  · 651pp  · 186,130 words

cocreating the Unix operating system, used his turn at the lectern to share his concerns on where technology was headed. He’d titled his lecture “Reflections on Trusting Trust,” and his conclusion was this: unless you wrote the source code yourself, you could never be confident that a computer program wasn’t a Trojan

his 2013 book, Command and Control: Nuclear Weapons, the Damascus Accident and the Illusion of Safety (Penguin Press). Ken Thompson’s 1984 Turing Award speech, “Reflections on Trusting Trust,” is available here: www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf. Gosler’s Chaperon Experiments were also detailed in a 2016 dissertation

, here, here Ratcliffe, John, here Rather, Dan, here Raymond, Eric S., here Raytheon, here Reagan, Ronald, here, here, here, here Reckitt Benckiser, here Reddit, here “Reflections on Trusting Trust” (Thompson), here Retz, Dave, here Rhodes, Benjamin, here Rice, Alex, here, here, here Richarte, Gerardo (Gera), here, here Rizzo, Juliano, here, here Robertson, Pat, here

New York 2140

by Kim Stanley Robinson  · 14 Mar 2017  · 693pp  · 204,042 words

code that you did not totally create yourself. Misguided use of a computer is no more amazing than drunk driving of an automobile. —Ken Thompson, “Reflections on Trusting Trust” A bird in the hand is worth what it will bring. noted Ambrose Bierce c) Franklin Numbers often fill my head. While waiting for my

Dark Mirror: Edward Snowden and the Surveillance State

by Barton Gellman  · 20 May 2020  · 562pp  · 153,825 words

conspiracy: See chapter 7. Eventually he agreed to breakfast: James R. Clapper, interview with author, August 17, 2018. as long ago as 1984: Kenneth Thompson, “Reflections on Trusting Trust,” Turing Award lecture, reproduced in Communications of the ACM, August 1984, at https://perma.cc/NL2L-7JX3. the Gemalto gambit: This story came to light

Turing's Vision: The Birth of Computer Science

by Chris Bernhardt  · 12 May 2016  · 210pp  · 62,771 words

Computation, Cengage Learning, 2012. [46] Soare, Robert. “Formalism and intuition in computability,” Phil. Trans. R, soc. A, (2012) 370, pp. 3277–3304. [47] Thompson, Ken. “Reflections on Trusting Trust,” Communications of the ACM, August 1984, vol. 27, no. 8, pp. 761–763. [48] Tibor, Radó. “On non-computable functions,” Bell System Technical Journal 41

, 155 Whitehead, Alfred North, Principia Mathematica, 7, 8, 10, 16 Wiener, Norbert, 26 Williams, Frederick, 156 Wolfram, Stephen, 85, 103, 164 Zuse, Konrad, 154 1 “Reflections on Trusting Trust” was presented by Ken Thompson in 1983. It was published in the Communications of the ACM and is widely available on the web.