Trojan defence: A forensic view

  • Authors:
  • Dan Haagman;Byrne Ghavalas

  • Affiliations:
  • 7 Safe Information Security, Ashwell Point, Babraham Road, Sawston, Cambridge CB2 4LJ, United Kingdom;7 Safe Information Security, Ashwell Point, Babraham Road, Sawston, Cambridge CB2 4LJ, United Kingdom

  • Venue:
  • Digital Investigation: The International Journal of Digital Forensics & Incident Response
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Trojan defence; ''I didn't do it, someone else did'' - myth or reality? This two-part article investigates the fascinating area of Trojan & network forensics and puts forward a set of processes to aid forensic practitioners in this complex and difficult area. Part I examines the Trojan defence, how Trojan horses are constructed and considers the collection of volatile data. Part II takes this further by investigating some of the forensic artefacts and evidence that may be found by a forensic practitioner and considers how to piece together the evidence to either accept or refute a Trojan defence.