Countering Trusting Trust through
Please refer to the paper
Trust through Diverse Double-Compiling
to answer the four questions below. Email me your answers to these
questions before midnight on Wednesday, April 25th.
- What are some of the potential benefits to an attacker that can
result from using a "trusting trust" attack?
- Name and give a brief description of the 3 mechanisms an attacker
uses that make a "trusting trust" attack work.
- Briefly describe how to perform diverse double-compiling.
- Diverse double-compiling requires a trusted compiler and trusted
environment(s). Name and briefly describe two of the ways that can be
used to gain a great amount of trust through diversity.