Trojan Programs and Covert Channels

  • David J. Marchette
Chapter
Part of the Statistics for Engineering and Information Science book series (ISS)

Abstract

We are all familiar with the story of the Trojan Horse. The Greeks built a large wooden horse (or rabbit, according to Monty Python), rolled the horse up to the gates of Troy, and left. The Trojans, thinking this was a gift, brought the horse inside the gates. Unbeknownst to them, the horse contained Greek warriors, who sneaked out under cloak of darkness and opened the gates, letting in the rest of the Greek army, resulting in the sacking of Troy.

Keywords

Intrusion Detection System JPEG Compression Digital Watermark Trojan Horse Malicious Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media New York 2001

Authors and Affiliations

  • David J. Marchette
    • 1
  1. 1.Naval Surface Warfare CenterDahlgrenUSA

Personalised recommendations