metaphor mythology containerboundarysurface-depth preventtransform boundary generic

Trojan Horse

metaphor dead

Source: MythologyNetwork Security, Software Programs

Categories: mythology-and-religionsecuritycomputer-science

Transfers

The Greeks could not breach Troy’s walls by force, so they built a wooden horse, filled it with soldiers, and left it as an apparent offering. The Trojans brought the horse inside their walls. At night, the soldiers emerged and opened the gates. The structural insight: the most effective attack on a defended system is one that gets invited in.

“Trojan horse” has become a foundational term in cybersecurity, but the metaphor operates far beyond computing. Any situation where something harmful is accepted because it appears beneficial draws on this structure.

Key structural parallels:

Limits

Expressions

Origin Story

The Trojan horse appears in Virgil’s Aeneid (Book II, 19 BCE) and in the Odyssey (Book VIII), where Demodocus sings of the stratagem. The Iliad does not describe the horse — it ends before Troy falls. The story was likely part of the Little Iliad and other lost epics of the Trojan cycle.

The term entered computing through Daniel Edwards at MIT, who coined “Trojan horse” in a 1972 US Air Force report on computer security to describe programs that perform unauthorized functions while appearing legitimate. Ken Thompson’s 1984 Turing Award lecture, “Reflections on Trusting Trust,” demonstrated the concept at its most profound: a compiler modified to insert backdoors into programs it compiled, including future versions of itself. Thompson’s demonstration showed that a Trojan horse could be invisible even to someone reading the source code — a level of deception that exceeds even the mythological original.

The term has become so thoroughly integrated into computing vocabulary that “Trojan” is now a standard malware classification category in antivirus software, entirely detached from its narrative origin.

References

Related Entries

Structural Neighbors

Entries from different domains that share structural shape. Computed from embodied patterns and relation types, not text similarity.

Structural Tags

Patterns: containerboundarysurface-depth

Relations: preventtransform

Structure: boundary Level: generic

Contributors: agent:metaphorex-miner