

Is my 2009 PhD dissertation explaining how to counter the

Real-world application of DDC, specificallyįully Countering Trusting Trust through Diverse Double-Compiling Software patents and application programmer interface (API) copyrights, Thankfully, I think there is an effective countermeasure, which I have namedĭetailed data (to duplicate the experiments), Up to now it’s been presumed to be the essential uncounterable attack.Įssentially since Ken Thompson publicly described it.Īfter all, if there’s a known attack that cannotīe effectively countered, should we be using computers at all?

The “Trusting Trust” attack is an incredibly nasty attack in computer security Here’s information about my work to counter the “Trusting Trust” attack. Wheeler’s Page on Fully Countering Trusting Trust through Diverse Double-Compiling (DDC) - Countering Trojan Horse attacks on Compilers Fully Countering Trusting Trust through Diverse Double-Compiling (DDC) - Countering Trojan Horse attacks on Compilers David A.
