Countering Trusting Trust through Diverse Double-Compiling

Please refer to the paper

         Countering Trusting Trust through Diverse Double-Compiling

to answer the four questions below. Email me your answers to these questions before midnight on Wednesday, April 25th.

  1. What are some of the potential benefits to an attacker that can result from using a "trusting trust" attack?
    [Pages 3-4]

  2. Name and give a brief description of the 3 mechanisms an attacker uses that make a "trusting trust" attack work.
    [Page 4]

  3. Briefly describe how to perform diverse double-compiling.
    [Page 5]

  4. Diverse double-compiling requires a trusted compiler and trusted environment(s). Name and briefly describe two of the ways that can be used to gain a great amount of trust through diversity.
    [Page 7]