The Ken Thompson method of implanting malware was to use com

The Ken Thompson method of implanting malware was to use compilers put malware in the compiled code, which did not exist in the source code. Thus we can implement a compiler that always puts one malicious function (e.g. listener) into every executable.

Suppose an attacker has been successful in distributing such a compiler and some applications are affected. Describe how the attacker will now utilize the malware to download new code into infected machines.

-- assume every compiled code generated by  (Note, you will have to describe how the compiler generated malware works and how it is invoked and how it achieves the desired result).

Solution

The work of compiler is to convert the source code( HLL language ) into machine language so that the machine can understand the human generated code easily and can produce the output. The malware is present in any of the library function which is to be called surely as the source code is in a state of compilation so definately the malware will get executed and the action will get performed.

Eg: if i want a virus to get executed in windows the best logic is i write a virus code in text file merge it with any software or any application and give it to user. Whenever the user executes the application the virus will automatically get executed in the background.   

The Ken Thompson method of implanting malware was to use compilers put malware in the compiled code, which did not exist in the source code. Thus we can impleme

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site