Yahoo Search Busca da Web

Resultado da Busca

  1. Sorted by: 33. Reflections on Trusting Trust is a lecture by Ken Thompson in which he explains the hack. Briefly: he hacked /bin/login to introduce a backdoor. he did this by hacking the compiler to introduce the backdoor into a binary whenever it detected that it was compiling the login source code. he also hacked the compiler to introduce the ...

  2. Ken Thompson Hack (1984) Ken Thompson outlined a method for corrupting a compiler binary (and other compiled software, like a login script on a *nix system) in 1984. I was curious to know if modern compilation has addressed this security flaw or not. Short description: Re-write compiler code to contain 2 flaws:

  3. 9 de abr. de 2017 · Closed 7 years ago. I understand Ken Thmpson hack involved like someone has mentioned on here. he hacked /bin/login to introduce a backdoor. he did this by hacking the compiler to introduce the backdoor into a binary whenever it detected that it was compiling the login source code. he also hacked the compiler to introduce the backdoor-producing ...

  4. No. The source code is not usable since it cannot be executed, only machine code can be executed. And to transform it into a binary you need a compiler. But you have no assurance that the compiler you are using to make that binary does, in fact, make a faithful job of the transformation. To guard against the Thompson hack you have to bootstrap ...

  5. 27 de fev. de 2013 · The second edition of Unix was developed for the PDP-11 at Bell Labs by Ken Thompson, Dennis Ritchie and others. It extended the First Edition with more system calls and more commands. This edition also saw the beginning of the C language, which was used to write some of the commands...

  6. 16 de mai. de 2011 · Also from wiki: The first C compiler written by Dennis Ritchie used a recursive descent parser, incorporated specific knowledge about the PDP-11, and relied on an optional machine-specific optimizer to improve the assembly language code it generated. The first C compiler was also written by him, in assembly.

  7. 19 de set. de 2016 · [Update] I sent email to Ken Thompson, creator of B and one of the co-creators of C, inquiring about the rationale for choosing ^ as C's XOR operator, and asking permission to share the answer here. His reply (slightly reformatted for readability): From: Ken Thompson Sent: Thursday, September 29, 2016 4:50 AM To: Norbert Juffa

  8. 11 de dez. de 2019 · Ken Thompson wrote that at first, he thought that he would absolutely hate this; after all, he was involved in the creation of several programming languages (B) and operating systems (Unix, Plan 9), and shaped the style of C, and he has very strong opinions.

  9. 7 de jun. de 2021 · I voted to close this question as "unclear". There is no such thing as "secure". You have to provide a precise, unambiguous, complete, objective specification of what, exactly your threat model is.

  10. 3 de mai. de 2023 · In C you cannot assign arrays directly. At first I thought this might because the C facilities were supposed to be implementable with a single or a few instructions and more complicated functionality was offloaded to standard library functions. After all using memcpy() is not that hard. However, one can directly assign structures/unions which ...

  1. As pessoas também buscaram por