Unintended components or operations are placed in hardware,
firmware, software, or wetware causing unintended and/or inappropriate
behavior. Examples include time bombs, use or condition bombs, flawed
integrated circuits, additional components on boards, additional
instructions in memory, operating system modifications, name
overloaded programs placed in an execution path, added or modified circuitry,
mechanical components, false connectors, false panels, radios placed in
network connectors, displays, wires, or other similar components.
Complexity: Detecting Trojan horses is almost certainly an undecidable
problem (although nobody has apparently proven this it seems clear) but
inadequate mathematical analysis has been done in this subject to provide
further clarification.
fc@red.a.net