article
Free Access

Reflections on trusting trust

Abstract

To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software.

References

  1. 1.Bobrow, D.G., Burchfiel, J.D., Murphy, D.L., and Tomlinson, R.S. TENEX, a paged time-sharing system for the PDP-10. Commun. ACM 15, 3 (Mar. 1972), 135-143. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.Kernighan, B.W., and Ritchie, D.M. The C Programming Language. Prentice-Hall, Englewood Cliffs, N.J., 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.Ritchie, D.M., and Thompson, K. The UNIX time-sharing system. Commun. ACM 17, (July 1974), 365-375. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.Unknown Air Force Document.Google ScholarGoogle Scholar

Index Terms

  1. Reflections on trusting trust

        Reviews

        Grady Gaston Early

        Ken Thompson's 1983 Turing Award lecture is a fascinating glimpse at a current sociological phenomenon :V unauthorized access to computer systems. The first part of the lecture deals with a hacker's delight :V in C, of course. The second part extends the idea to illustrate how a compiler in this case, the C compiler can be made completely portable. The final extension, in the third part of the lecture, deals with untraceable insertions of Trojan Horses into program translators. The moral is unsettling, as well as obvious: If you didn't write it, you can't trust it.:L

        Access critical reviews of Computing literature here

        Become a reviewer for Computing Reviews.

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Article Metrics

          • Downloads (Last 12 months)7,160
          • Downloads (Last 6 weeks)1,081

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!