Security in Industrial Communication Systems 22-11
• Trojan horse: A Trojan horse obscures its malicious intent by pretending to have a useful func-
tion. However, aer being activated by the user, a hidden malicious function is performed that
allows a remote adversary to gain unauthorized access to the host that executes the Trojan
horse.
• Logical bomb: A logical bomb is malware that only activates itself aer certain conditions are
met. A special kind of logical bomb is a time bomb where a specic point in time is used as
trigger.
•
Rootkit:
A
rootkit
is
a
special
kind
of
malware
that
infects
the
system
in
a
way
that
it
remains
invisible
at
the
host.
To
achieve
this,
rootkits
typically
replace
core
components
of
the
system
soware
li
ke