Skip to main content
Top

2001 | OriginalPaper | Chapter

Trojan Programs and Covert Channels

Author : David J. Marchette

Published in: Computer Intrusion Detection and Network Monitoring

Publisher: Springer New York

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

We are all familiar with the story of the Trojan Horse. The Greeks built a large wooden horse (or rabbit, according to Monty Python), rolled the horse up to the gates of Troy, and left. The Trojans, thinking this was a gift, brought the horse inside the gates. Unbeknownst to them, the horse contained Greek warriors, who sneaked out under cloak of darkness and opened the gates, letting in the rest of the Greek army, resulting in the sacking of Troy.

Metadata
Title
Trojan Programs and Covert Channels
Author
David J. Marchette
Copyright Year
2001
Publisher
Springer New York
DOI
https://doi.org/10.1007/978-1-4757-3458-4_7

Premium Partner