Reflections on Trusting Trust
GPTKB entity
Statements (20)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:concert_tour
gptkb:computer_science_paper |
| gptkbp:author |
gptkb:Ken_Thompson
|
| gptkbp:citation |
numerous security papers
|
| gptkbp:deliveredBy |
ACM Turing Award lecture
|
| gptkbp:influenced |
computer security research
software supply chain security |
| gptkbp:language |
English
|
| gptkbp:notableFor |
demonstrating compiler-based attacks
introducing the concept of trusting trust |
| gptkbp:publicationYear |
1984
|
| gptkbp:publishedIn |
gptkb:Communications_of_the_ACM
|
| gptkbp:relatedAward |
gptkb:Turing_Award
|
| gptkbp:topic |
software security
compiler backdoors trust in computing |
| gptkbp:url |
https://dl.acm.org/doi/10.1145/358198.358210
|
| gptkbp:bfsParent |
gptkb:Kenneth_Thompson
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Reflections on Trusting Trust
|