malicious logic
A program implemented in hardware, firmware, or software, and whose purpose is to perform some unauthorized or harmful action. Note: Examples of malicious logic are a logic bomb, a Trojan horse, a virus, a worm. [2382-pt.8] 2. Hardware, software, or firmware capable of performing an unauthorized function on an information system. [INFOSEC-99]