Check out the new USENIX Web site. next up previous
Next: Palm OS Device Architecture Up: Security Analysis of the Previous: Introduction

Summary of Malicious Code Types

For the purposes of clarity, we will classify malicious code into three areas [23]:
next up previous
Next: Palm OS Device Architecture Up: Security Analysis of the Previous: Introduction
Kingpin
2001-05-09