Author Archives


Reflections on Trusting Trust Revisited

Security is often described as a weak-link phenomenon. Ken Thompson in his 1983 Turing Award Lecture [3] described how a compiler could be modified to plant a Trojan horse into the system’s login authentication program so that it would accept a known password. In addition, the C compiler could be altered to propagate this change […]

Shape the Future of Computing

ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.

Get Involved