Computing Trojan horse