Hacker News
- Trusting Trust: Ken Thompson on supply chain security (1984) https://dl.acm.org/doi/pdf/10.1145/358198.358210 21 comments
Linking pages
- Ken Thompson Really Did Launch His "Trusting Trust" Trojan Attack in Real Life https://niconiconi.neocities.org/posts/ken-thompson-really-did-launch-his-trusting-trust-trojan-attack-in-real-life/ 339 comments
- A web of trust for npm | Tao Bojlén https://www.btao.org/2020/10/02/npm-trust.html 119 comments
- TAG: Tagged Architecture Guide | ACM Computing Surveys https://web.archive.org/web/20220512014406id_/https:/dl.acm.org/doi/pdf/10.1145/3533704 6 comments
- Bicycles for the mind have to be see-through | Companion Proceedings of the 4th International Conference on Art, Science, and Engineering of Programming https://dl.acm.org/doi/abs/10.1145/3397537.3397547 1 comment
- Huawei 5G, The UK Gets A Lesson In Go · Privacy, Power, & Protection In The Cyber Century https://blog.eutopian.io/huawei-5g-the-uk-gets-a-lesson-in-go/ 0 comments
- On business adoption and use of reproducible builds for open and closed source software | SpringerLink https://link.springer.com/article/10.1007/s11219-022-09607-z 0 comments
- grsecurity - Toolchain Necromancy: Past Mistakes Haunting ASLR https://grsecurity.net/toolchain_necromancy_past_mistakes_haunting_aslr 0 comments
Related searches:
Search whole site: site:dl.acm.org
Search title: Trusting Trust: Ken Thompson on supply chain security (1984)
See how to search.