Abstract
A Trojan horse is a common type of rogue software. Such a program hides in a computer and has some malicious function. In contrast to viruses and worms, Trojans do not replicate. This chapter summarizes the main features of Trojans and also discusses how to modify a compiler in a devious way, to make it plant Trojans in programs that it compiles.
The Trojan war, described by Homer (Greek Oμηρoς) in the Iliadand the Odyssey, took place about 3200 years ago, in the beginning of the twelfth century b.c.. We don’t know whether the war actually happened or even if Homer existed, but throughout history (and even today) this chapter of Greek history has fascinated readers and writers alike and has inspired countless stories, poems, plays, and archaeological excavations. The Iliad describes how, having failed to capture Troy after ten years of siege and war, the Greeks, on the advice of Odysseus, made a giant wooden horse, left it at the gates of Troy, ostensibly as a peace offering, and pretended to sail away. The Trojans, intentionally confused by the Gods, dragged the horse inside the city walls and celebrated their “victory.” At night, Greek soldiers emerged from the horse’s hollow belly and opened the city gates, allowing their compatriots to pour in and capture and destroy Troy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Denning, Peter J. (1990) Computers Under Attack: Intruders, Worms, and Viruses, New York, ACM Press and Addison Wesley.
Thompson, Ken (1984) “Reflections on Trusting Trust,” Communications Of The ACM, 27(8)172–180.
Witten, Ian H. (1987) “Computer (In)security: Infiltrating Open Systems,” ABACUS, 4(4)7–25. Also available from cryptome.org/compinsec.htm and in [Denning 90].
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2010 Springer London
About this chapter
Cite this chapter
Salomon, D. (2010). Trojan Horses. In: Elements of Computer Security. Undergraduate Topics in Computer Science. Springer, London. https://doi.org/10.1007/978-0-85729-006-9_4
Download citation
DOI: https://doi.org/10.1007/978-0-85729-006-9_4
Published:
Publisher Name: Springer, London
Print ISBN: 978-0-85729-005-2
Online ISBN: 978-0-85729-006-9
eBook Packages: Computer ScienceComputer Science (R0)