Abstract
A new class of vulnerabilities, called trojan source, has been recently discovered by Boucher and Anderson. This work describes the state of the art of known trojan source attacks, illustrates two new attack variants involving configuration files and Java code, and describes practical preventive measures.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have