A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.
NIST SP 800-12 Rev. 1 under Trojan Horse
NIST SP 800-82 Rev. 2 under Trojan Horse
A computer program containing an apparent or actual useful function that also contains additional functions that permit the unauthorized collection, falsification, or destruction of data.
NIST SP 800-47 under Trojan Horse
A useful or seemingly useful program that contains hidden code of a malicious nature that executes when the program is invoked.
NIST SP 800-28 Version 2 under Trojan Horse