How to Protect against Trojan Horse