Definition
A program which is different from the specified (specs) one is said to contain a Trojan horse. The Trojan horse may be malicious. It is undecidable to decide whether a program is free of Trojan horses.
Theory
A Trojan horse that, when executed, can modify other computer programs, e.g., by copying itself (or a part of it) into these is called a computer virus. Protection mechanisms used against computer viruses are to:
Use digitally signed computer programs. Provided these digitally signed programs were developed in a secure and trusted environment, then one can detect modifications to the digitally signed program [3]. (For implementation issues see [1].) If the environment was not trusted, known computer viruses may be in the digitally signed program and remain undetected unless virus scanners are used also.
...
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsRecommended Reading
Davida GI, Desmedt YG, Matt BJ (1989) Defending systems against viruses through cryptographic authentication. In: Proceedings 1989 IEEE symposium on security and privacy, May 1989. Oakland, CA, pp 312–318
Hoffman LJ (ed) (1990) Rogue programs: viruses, worms and trojan horses. Van Nostrand Reinhold, New York
Pozzo MM, Gray TE (1987) An approach to containing viruses. Comput Secur 6(4):321–331
White SR (2000) Virus bulletin 2010: a retrospective. In: International virus bulletin conference. Orlando, FL
White SR, Swimmer M, Pring EJ, Arnold WC, Chess DM, Morar JF (1999) Anatomy of a commercial-grade immune system. In: International virus bulletin conference. Vancouver, Canada
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Desmedt, Y. (2011). Trojan Horses, Computer Viruses, and Worms. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_331
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_331
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering