Countering Trusting Trust through
Diverse Double-Compiling
Please refer to the paper
Countering Trusting
Trust through Diverse Double-Compiling
to answer the four questions below. Email me your answers to these
questions before midnight on Wednesday, April 25th.
- What are some of the potential benefits to an attacker that can
result from using a "trusting trust" attack?
[Pages 3-4]
- Name and give a brief description of the 3 mechanisms an attacker
uses that make a "trusting trust" attack work.
[Page 4]
- Briefly describe how to perform diverse double-compiling.
[Page 5]
- Diverse double-compiling requires a trusted compiler and trusted
environment(s). Name and briefly describe two of the ways that can be
used to gain a great amount of trust through diversity.
[Page 7]
|