Reflections on Trusting Trust
GPTKB entity
Statements (20)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:concert_tour
computer science paper |
gptkbp:author |
gptkb:Ken_Thompson
|
gptkbp:citation |
numerous security papers
|
gptkbp:deliveredBy |
ACM Turing Award lecture
|
https://www.w3.org/2000/01/rdf-schema#label |
Reflections on Trusting Trust
|
gptkbp:influenced |
computer security research
software supply chain security |
gptkbp:language |
English
|
gptkbp:notableFor |
demonstrating compiler-based attacks
introducing the concept of trusting trust |
gptkbp:publicationYear |
1984
|
gptkbp:publishedIn |
gptkb:Communications_of_the_ACM
|
gptkbp:relatedAward |
Turing Award
|
gptkbp:topic |
software security
compiler backdoors trust in computing |
gptkbp:url |
https://dl.acm.org/doi/10.1145/358198.358210
|
gptkbp:bfsParent |
gptkb:Kenneth_Thompson
|
gptkbp:bfsLayer |
7
|