4370 shaares
In the lecture, Ken explains in three steps how to modify a C compiler binary to insert a backdoor when compiling the “login” program, leaving no trace in the source code. In this post, we will run the backdoored Go compiler using Ken’s actual code. But first, a brief summary of the important parts of the lecture.