Read the classic Ken Thompson Compiler Hack article.
Answer the following questions:
1) Describe briefly and clearly how the attack works
2) If you suspect that your machine has been compromised, what should you do about it?
3) What other kinds of software like compilers do we usually trust that have the potential to be compromised?
Back to top