An attacker installs or adds malicious logic into a seemingly benign component of the system. This logic is often hidden from the user of the system and works behind the scenes to achieve negative impacts.
More information is available — Please select a different filter.
Page Last Updated or Reviewed:
May 01, 2017
Use of the Common Attack Pattern Enumeration and Classification dictionary and classification taxonomy, and the associated references from this website, are subject to the