Reflections on trusting trust

@article{Thompson1984ReflectionsOT,
  title={Reflections on trusting trust},
  author={Ken Thompson},
  journal={Commun. ACM},
  year={1984},
  volume={27},
  pages={761-763}
}
  • K. Thompson
  • Published 1 August 1984
  • Psychology
  • Commun. ACM
To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software. 

Figures from this paper

Reflections on Trust in Devices: An Informal Survey of Human Trust in an Internet-of-Things Context

Trust is an essential component of every interaction we make. For some transactions we need very little trust, while for others we may be quite risk averse. In this paper we investigate trust in an

Reproducible Builds: Increasing the Integrity of Software Supply Chains

TLDR
It is shown how software users can benefit from the increased trust in executables they run as well as how developers and build engineers can help make software reproducible.

Inspiration and trust

Not every important problem can be solved through science and technology, but that doesn't mean they shouldn't be addressed.

Does trusted computing remedy computer security problems?

TLDR
It is argued that although trusted computing has some merits, it neither provides a complete remedy nor is it likely to prevail in the PC mass market.

Open The case for Zero Trust Digital Forensics

TLDR
Electrolysis techniques are conducted to evaluate the viability of this approach based on current research efforts and to compare and contrast the results with those of previous studies.

The epistemology of computer security

This paper studies computer security from first principles. The basic questions "Why?", "How do we know what we know?" and "What are the implications of what we believe?"

Toward an approach to measuring software trust

TLDR
A set of criteria classes consisting of various trust principle combinations is shown to provide a scale for measuring and comparing trust.

Information Protection

  • R. Conley
  • Computer Science
    MILCOM 1987 - IEEE Military Communications Conference - Crisis Communications: The Promise and Reality
  • 1987
The subject of information security is discussed and several methods for protection of information are reviewed. Emphasis is placed on security methods to insure their application is consistent with

Beyond Planted Bugs in "Trusting Trust": The Input-Processing Frontier

Big data is changing the landscape of security tools for network monitoring, security information and event management, and forensics; however, in the eternal arms race of attack and defense,

The Twelve Principles of Trusted Solutions

Abstract In what follows, we discuss aspects that would make a security solution work in practice. Experience shows that adding security components does not necessarily raise the level of trust of a
...

References

SHOWING 1-9 OF 9 REFERENCES

The UNIX Time-sharing System

TLDR
The strong and weak points of UNIX are discussed and a good case can be made that it is in essence a modern implementation of MIT’s CTSS system.

The C Programming Language

TLDR
This ebook is the first authorized digital version of Kernighan and Ritchie's 1988 classic, The C Programming Language (2nd Ed.), and is a "must-have" reference for every serious programmer's digital library.

C++ Programming Language

TLDR
Bjarne Stroustrup makes C even more accessible to those new to the language, while adding advanced information and techniques that even expert C programmers will find invaluable.

TENEX: a paged time sharing system for the PDP-10

TLDR
Although the implementation described here required some compromise to achieve a system operational within six months of hardware checkout, TENEX has met its major goals and provided reliable service at several sites and through the ARPA network.

a paged time-sharing system for the PDP-I0

  • Commun. ACM
  • 1972

Author's Present Address: Ken Thompson, AT&T Bell Laboratories, Room 2C-519. 600 Mountain Ave

    Unknown Air Force Document

      Room 2C-519. 600 Mountain Ave

      • Room 2C-519. 600 Mountain Ave

      Author's Present Address: Ken Thompson

      • Author's Present Address: Ken Thompson