Hacker News new | past | comments | ask | show | jobs | submit login

Can you explain this a bit more? I've only read both the abstracts but if I understand right your link deals with compiler-level attacks but the OP deals with hardware-level attacks ("fabrication-time attacker").



It was basically a comment on the submission title -- Ken Thompson's famous attack has a counter that's been known about for a while. For the submission itself it's not as related as other commenters note they don't provide a way for the exploit to propagate like KT's attack. I'll have to read the full paper later but I wonder if it references https://www.usenix.org/legacy/event/leet08/tech/full_papers/...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: