Trojan Programs and Covert Channels
We are all familiar with the story of the Trojan Horse. The Greeks built a large wooden horse (or rabbit, according to Monty Python), rolled the horse up to the gates of Troy, and left. The Trojans, thinking this was a gift, brought the horse inside the gates. Unbeknownst to them, the horse contained Greek warriors, who sneaked out under cloak of darkness and opened the gates, letting in the rest of the Greek army, resulting in the sacking of Troy.
KeywordsIntrusion Detection System JPEG Compression Digital Watermark Trojan Horse Malicious Code
Unable to display preview. Download preview PDF.