Skip to main content

Trojan Horses, Computer Viruses, and Worms

  • Reference work entry
  • 423 Accesses

Related Concepts

Dynamic Malware Analysis; Malware Behavior Clustering; Malware Detection; Reverse Engineering of Malware Emulators; Unpacking Malware

Definition

A program which is different from the specified (specs) one is said to contain a Trojan horse. The Trojan horse may be malicious. It is undecidable to decide whether a program is free of Trojan horses.

Theory

A Trojan horse that, when executed, can modify other computer programs, e.g., by copying itself (or a part of it) into these is called a computer virus. Protection mechanisms used against computer viruses are to:

  • Use digitally signed computer programs. Provided these digitally signed programs were developed in a secure and trusted environment, then one can detect modifications to the digitally signed program [3]. (For implementation issues see [1].) If the environment was not trusted, known computer viruses may be in the digitally signed program and remain undetected unless virus scanners are used also.

  • ...

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Recommended Reading

  1. Davida GI, Desmedt YG, Matt BJ (1989) Defending systems against viruses through cryptographic authentication. In: Proceedings 1989 IEEE symposium on security and privacy, May 1989. Oakland, CA, pp 312–318

    Google Scholar 

  2. Hoffman LJ (ed) (1990) Rogue programs: viruses, worms and trojan horses. Van Nostrand Reinhold, New York

    Google Scholar 

  3. Pozzo MM, Gray TE (1987) An approach to containing viruses. Comput Secur 6(4):321–331

    Article  Google Scholar 

  4. White SR (2000) Virus bulletin 2010: a retrospective. In: International virus bulletin conference. Orlando, FL

    Google Scholar 

  5. White SR, Swimmer M, Pring EJ, Arnold WC, Chess DM, Morar JF (1999) Anatomy of a commercial-grade immune system. In: International virus bulletin conference. Vancouver, Canada

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Desmedt, Y. (2011). Trojan Horses, Computer Viruses, and Worms. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_331

Download citation

Publish with us

Policies and ethics