Topic: limitations of system security
Topic: security leaks and weaknesses
Quotation Skeleton
To put an invisible Trojan horse (e.g., allow … source that compiles a normal part of the … with the normal C compiler to produce a … [doubly] bugged binary. … source of the compiler and the new binary … with no trace in source anywhere.
Google-1Google-2
Copyright clearance needed for quotation.
Related Topics
Topic: limitations of system security (32 items)
Topic: security leaks and weaknesses (56 items)