for example) • Modify system file • Modify ordinary executable program Conceal self • Intercept system calls that would reveal self and falsify result • Classify self as “hidden” file Spread infection • Infect boot sector • Infect systems program • Infect ordinary program • Infect data ordinary program reads […]