Trojan Horse Programs
Adam L. Young, Cigital, Inc.
How Trojans Differ from Viruses and Worms
Early Investigations into Abnormal Finite Automata
Early Military Awareness Due to Shared-Resource Machines
The Trojan Threat to Nuclear Arms Control Verification Systems
Malicious versus Benign Trojan Horses
An Attempt to Categorize Trojans
Defenses against Trojan Horse Programs
Code Signing and Security Kernels
INTRODUCTION
In computer security, a Trojan horse is defined as a segment of executable code that performs some function that the user does not expect and that resides in a program. A Trojan can be placed in the program when the program is compiled or can be added to the program after it is compiled.
The term Trojan horse carries with it a very negative connotation due to the abundance of deployed Trojan horses that have been designed to subvert computer systems. At the very least, a Trojan horse may be nothing more than a nuisance, and at worst a Trojan horse can completely undermine the integrity of the machine that it resides on. An example of a Trojan that is merely an annoyance is the cookie ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.