3 research outputs found
On Belief: Aims, Norms, and Functions
In this dissertation, I explore whether teleological, normative, and functional theories of belief each have the resources to answer three central questions about the nature and normativity of belief. These questions are: (i) what are beliefs, (ii), why do we have them, and (iii) how should we interpret doxastic correctness--the principle that it is correct to believe that p if and only if p?
I argue that teleological and normative theories fail to adequately address these questions, and I develop and defend a functional alternative. In addition, I attempt to extend my functional theory of belief to account for another, related attitude: suspended belief
Countering Trusting Trust through Diverse Double-Compiling
An Air Force evaluation of Multics, and Ken Thompson's famous Turing award
lecture "Reflections on Trusting Trust," showed that compilers can be subverted
to insert malicious Trojan horses into critical software, including themselves.
If this attack goes undetected, even complete analysis of a system's source
code will not find the malicious code that is running, and methods for
detecting this particular attack are not widely known. This paper describes a
practical technique, termed diverse double-compiling (DDC), that detects this
attack and some compiler defects as well. Simply recompile the source code
twice: once with a second (trusted) compiler, and again using the result of the
first compilation. If the result is bit-for-bit identical with the untrusted
binary, then the source code accurately represents the binary. This technique
has been mentioned informally, but its issues and ramifications have not been
identified or discussed in a peer-reviewed work, nor has a public demonstration
been made. This paper describes the technique, justifies it, describes how to
overcome practical challenges, and demonstrates it.Comment: 13 pages