The accelerating trends of interconnectedness, complexity, and extensibilit
y are aggravating the already-serious threat posed by malicious code. To co
mbat malicious code, these authors argue for creating sound policy about so
ftware behavior and enforcing that policy through technological means.