Abstract
We are all familiar with the story of the Trojan Horse. The Greeks built a large wooden horse (or rabbit, according to Monty Python), rolled the horse up to the gates of Troy, and left. The Trojans, thinking this was a gift, brought the horse inside the gates. Unbeknownst to them, the horse contained Greek warriors, who sneaked out under cloak of darkness and opened the gates, letting in the rest of the Greek army, resulting in the sacking of Troy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer Science+Business Media New York
About this chapter
Cite this chapter
Marchette, D.J. (2001). Trojan Programs and Covert Channels. In: Computer Intrusion Detection and Network Monitoring. Statistics for Engineering and Information Science. Springer, New York, NY. https://doi.org/10.1007/978-1-4757-3458-4_7
Download citation
DOI: https://doi.org/10.1007/978-1-4757-3458-4_7
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4419-2937-2
Online ISBN: 978-1-4757-3458-4
eBook Packages: Springer Book Archive