Reading Questions

Remember to submit your answer to this quetion BEFORE the next class.

(Trojan Horse). In this paper, Thompson discussed a trojan horse which is embedded in the C compiler binary. Then at a first glance, to detect this trojan horse, one can simply disassembly the C compiler binary. Is this method feasible? Why or why not?