Towards a testbed for malicious code detection - UC Davis Computer ...

3 downloads 9002 Views 464KB Size Report
horses exist for all of the major personal computers in ... actions are carried out on a computer system. Security is violated when someone succeeds in retrieving ...