Location of Repository

Software Security CMSC 433

By Bill Pugh


• Making sure that if your software is misused, it doesn’t do any of the vast number of things you didn’t intend for the software to do 2 On trusting trust • You can hide a trojan horse in a compiler – or in the operating system

Year: 2011
OAI identifier: oai:CiteSeerX.psu:
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://www.cs.umd.edu/class/fa... (external link)
  • Suggested articles

    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.