Skip to main content

Trojan Horses

  • Chapter
  • First Online:
Elements of Computer Security

Part of the book series: Undergraduate Topics in Computer Science ((UTICS))

  • 3540 Accesses

Abstract

A Trojan horse is a common type of rogue software. Such a program hides in a computer and has some malicious function. In contrast to viruses and worms, Trojans do not replicate. This chapter summarizes the main features of Trojans and also discusses how to modify a compiler in a devious way, to make it plant Trojans in programs that it compiles.

The Trojan war, described by Homer (Greek Oμηρoς) in the Iliadand the Odyssey, took place about 3200 years ago, in the beginning of the twelfth century b.c.. We don’t know whether the war actually happened or even if Homer existed, but throughout history (and even today) this chapter of Greek history has fascinated readers and writers alike and has inspired countless stories, poems, plays, and archaeological excavations. The Iliad describes how, having failed to capture Troy after ten years of siege and war, the Greeks, on the advice of Odysseus, made a giant wooden horse, left it at the gates of Troy, ostensibly as a peace offering, and pretended to sail away. The Trojans, intentionally confused by the Gods, dragged the horse inside the city walls and celebrated their “victory.” At night, Greek soldiers emerged from the horse’s hollow belly and opened the city gates, allowing their compatriots to pour in and capture and destroy Troy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 29.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 39.95
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

  • Denning, Peter J. (1990) Computers Under Attack: Intruders, Worms, and Viruses, New York, ACM Press and Addison Wesley.

    Google Scholar 

  • Thompson, Ken (1984) “Reflections on Trusting Trust,” Communications Of The ACM, 27(8)172–180.

    Article  Google Scholar 

  • Witten, Ian H. (1987) “Computer (In)security: Infiltrating Open Systems,” ABACUS, 4(4)7–25. Also available from cryptome.org/compinsec.htm and in [Denning 90].

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David Salomon .

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer London

About this chapter

Cite this chapter

Salomon, D. (2010). Trojan Horses. In: Elements of Computer Security. Undergraduate Topics in Computer Science. Springer, London. https://doi.org/10.1007/978-0-85729-006-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-0-85729-006-9_4

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-0-85729-005-2

  • Online ISBN: 978-0-85729-006-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics