25.10.2013 Views

Webwasher 6.0.1 Anti-Malware User's Guide - McAfee

Webwasher 6.0.1 Anti-Malware User's Guide - McAfee

Webwasher 6.0.1 Anti-Malware User's Guide - McAfee

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

— Usage of vulnerable functionality<br />

Content Security<br />

This functionality is located in the host environment, e. g. the Web<br />

browser or the Java VM.<br />

• Operations primarily performed by all kinds of mobile code<br />

In this area, also select actions with regard to:<br />

— Read access to local files<br />

This includes the programmatic evaluation of (formerly obfuscated) program<br />

code.<br />

— Write access to local files<br />

This also includes locally mounted network shares.<br />

— Read access to the registry<br />

This includes operations like opening registry keys and reading registry<br />

values.<br />

— Write access to the registry<br />

This includes the creation and deletion of registry keys, as well as the<br />

modification of registry values.<br />

— Access to the network<br />

With this operation, code may be classified as potentially malicious regardless<br />

of the transport direction and application-level protocol.<br />

— Dynamic loading of program code<br />

This includes the instantiation of COM servers (as with ActiveX controls).<br />

— Dynamic creation of program code<br />

This includes the programmatic evaluation of (formerly obfuscated) program<br />

code.<br />

— Access to other processes<br />

An example of this is usage of Interprocess Communication (IPC) functionality.<br />

4–55

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!