Defenses against Application-Level
Trojan Horse Backdoors
¨Use antivirus tools
–Can detect fingerprints (by checking filenames, registry key settings, services) of attack tools
–Update virus definition files weekly
¨Don’t use single-purpose BO2K checkers
–Application itself may be a Trojan horse which installs BO2K but tells user that machine is clean