Figure 11: Targeted code type by attacker type