The first 10 years of the Trojan Horse defence
ثبت نشده
چکیده
A trojan is a type of malicious software (globally known as malware) that is either packaged along with a useful piece of software or pretends to be a piece of useful software itself. Once a trojan is activated, which usually goes unnoticed by the user, it releases a payload such as a virus or a backdoor that may allow a remote user to gain access to the system.2,3 A popular means of infection is for online downloads to be packaged with a trojan, resulting in an infection when the user runs the downloaded application. The more complex trojans – those that capture typed keyboard characters or permit a remote user access to the system – can be used to create a credible legal defence. This is in contrast to simple trojans, which act as a nuisance by deleting files and changing user settings. The THD is believed to have been first used in 2003, when it appeared in the Charles Schofield case.4 After a literature review of relevant publications over the past decade, this article discusses court cases where the THD has been used.
منابع مشابه
Quantitative Plausibility of the Trojan Horse Defence against Possession of Child Pornography
A new complexity-based metric has been developed to enable the relative plausibility of competing explanations for the existence of uncontested evidence to be determined quantitatively. This metric has been applied to the case of the Trojan horse defence against the possession of child pornography. Our results demonstrate that the Trojan horse defence in this case cannot be plausibly sustained,...
متن کاملELT: A Trojan Horse in Disguise?
Many people believe that language teaching is a neutral practice. However, this belief is not without its own opponents. To many scholars, teaching languages cannot be devoid of teaching cultural values of the target language, which tacitly aims at denigrating cultural values of the community of the learners who are learning it. The ultimate purpose of such cultural oppression, according to the...
متن کاملTrojan horse attacks on software for electronic signatures
Electronic signatures are introduced by more and more countries as legally binding means for signing electronic documents with the primary hope of boosting e-commerce and e-government. Given that the underlying cryptographic methods are sufficiently strong, attacks by Trojan horse programs on electronic signatures are becoming increasingly popular. Most of the current systems either employ cost...
متن کاملTransfer Reactions and Trojan Horse Method
It is pointed out that the Trojan-Horse method is a suitable tool to investigate subthreshold resonances. TRANSFER REACTIONS AND TROJAN HORSE METHOD A similarity between cross sections for two-body and closely related three-body reactions under certain kinematical conditions [1] led to the introduction of the Trojan-Horse method [2, 3, 4]. In this indirect approach a two-body reaction
متن کاملSecure FPGA Design by Filling Unused Spaces
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
متن کامل