Approaches to handling "Trojan Horse" threats

Yeheskel Lapid*, Niv Ahituv, Seev Neumann

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review


This paper examines the exposure of an information system to an attack by a "Trojan Horse" and trapdoors. It outlines some new encryption-based mechanisms that can reduce risks and losses caused by such attacks. It proposes models exhibit the direction and nature of the solutions for the threats.

Original languageEnglish
Pages (from-to)251-256
Number of pages6
JournalComputers and Security
Issue number3
StatePublished - Sep 1986


  • Data Encryption
  • Passwords
  • Security
  • Trojan Horse


Dive into the research topics of 'Approaches to handling "Trojan Horse" threats'. Together they form a unique fingerprint.

Cite this