Beyond Planted Bugs in "Trusting Trust": The Input-Processing Frontier
نویسندگان
چکیده
It’s been nearly thirty years from Ken Thompson’s “Reflections on Trusting Trust” and its famous verdict that “You can’t trust code that you did not totally create yourself.” If there is one practical lesson that the Internet taught us since then, it is that one cannot even trust one’s own code so long as that code meets arbitrary inputs from the Internet. Sooner or later a mixture of bugs or features turns the connected code into an execution engine for hostile inputs – indeed, it was sooner rather than later for the original Internet daemons. Over time, exploitable bugs became more complex, exploit payloads more sophisticated. Their composition first showed aspects of an art and then of a solid engineering process. Still, with a few exceptions, code connected to the Internet cannot be trusted. Even though everything Thompson predicted, including well-placed microcode bugs, has come to pass, there seems to be no need for a malicious entity to insert bugs into the software most of us use daily on the Internet. The input-subvertible bugs are already there. When a mechanism used for subversion is dealt with (as happened to the executable stack and predictable uniform address space layout), bugs simply seem to migrate to another protocol or layer. Input is still just as dangerous as it was for early implementations of SMTP and DNS.
منابع مشابه
Effect of Relocation and Rotation on Radial Efficiency Scores for a Partially Negative Data Problem
Negative data handling has gained a remarkable importance in the literature of Data Envelopment Analysis (DEA) to address many real life problems. Various erstwhile applications, in this arena, referred relocation of the origin to a superior (RDM) or to an inferior (Translated Input Oriented BCC) neighboring point. In this paper, the conditions for Rotation Invariance of various Data Envelop...
متن کاملRunning head: DEVELOPING TRUST: FIRST IMPRESSIONS AND EXPERIENCE 1 Developing Trust: First Impressions and Experience
Using the repeated Trust Game, we investigated how first impressions and experience affect trusting dispositions, beliefs, and behaviors. As in previous research, trusting beliefs and trust-related behaviors were greater at the start of the game for partners with trustworthy faces; and higher later in the game for partners who reciprocated. Three additional findings extended beyond the previous...
متن کاملErosion of Trust in the Medical Profession in India: Time for Doctors to Act
In India, over the last decade, a series of stewardship failures in the health system, particularly in the medical profession, have led to a massive erosion of trust in these institutions. In many low- and middle-income countries (LMICs), the situation is similar and has reached crisis proportions; this crisis requires urgent attention. This paper draws on the insights from the recent developme...
متن کاملAnalyzing Stripped Device-Driver Executables
This paper sketches the design and implementation of DeviceDriver Analyzer for x86 (DDA/x86), a prototype analysis tool for finding bugs in stripped Windows device-driver executables (i.e., when neither source code nor symbol-table/debugging information is available), and presents a case study. DDA/x86 was able to find known bugs (previously discovered by source-code-based analysis tools) along...
متن کاملStudy on Trusting Relationship in Complex Network
In order to find the information dissemination rules in the social network, trusting relationship is proposed from a view of the influences of the members in a complex network. The basic metric, trusting value is defined to measure trusting degree between individuals in the network. A greedy algorithm with O(n) time complexity is designed to calculate trusting values of all node pairs. Accordin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEEE Security & Privacy
دوره 12 شماره
صفحات -
تاریخ انتشار 2014