2001 | OriginalPaper | Chapter
Trojan Programs and Covert Channels
Author : David J. Marchette
Published in: Computer Intrusion Detection and Network Monitoring
Publisher: Springer New York
Included in: Professional Book Archive
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
We are all familiar with the story of the Trojan Horse. The Greeks built a large wooden horse (or rabbit, according to Monty Python), rolled the horse up to the gates of Troy, and left. The Trojans, thinking this was a gift, brought the horse inside the gates. Unbeknownst to them, the horse contained Greek warriors, who sneaked out under cloak of darkness and opened the gates, letting in the rest of the Greek army, resulting in the sacking of Troy.