Home > Articles > Security > Software Security

Trojan Horses

  • Print
  • + Share This
This chapter is from the book

This chapter is from the book

References

[1] "Win2K Processes," http://users.aber.ac.uk/anw1/processes.html.

[2] David A. Solomon and Mark E. Russinovich, Inside Microsoft Windows 2000, Third Edition, Microsoft Press, 2000.

[3] CERT Coordination Center, "Wuarchive Ftpd Trojan Horse," April 6, 1994, http://www.cert.org/advisories/CA-1994-07.html.

[4] CERT Coordination Center, "Trojan Horse Version of TCP Wrappers," January 21, 1999, http://www.cert.org/advisories/CA-1999-01.html. [5] Ken Thompson, "Reflections on Trusting Trust," Communication of the ACM, Vol. 27, No. 8, August 1984, pp. 761–763, http://www.acm.org/ classics/sep95/.

[6] Watts S. Humphrey, "Bugs or defects?" http://interactive.sei.cmu.edu/ news@sei/columns/watts_new/1999/March/watts-mar99.htm#humphrey.

[7] Kathryn Balint, "Software Firms Need to Plug Security Holes, Critics Contend," San Diego Union-Tribune, http://www.signonsandiego.com/ news/computing/personaltech/20020128-9999_mz1b28securi.html. [8] Eric Cole, Hiding in Plain Sight: Steganography and the Art of Covert Communication, Wiley, 2003.

  • + Share This
  • 🔖 Save To Your Account