Research Article

Evaluating Grayware Characteristics and Risks

Table 4

Installation mechanisms employed by grayware species.

ID Channel Description Sample patterns

1Bundle with softwareIndependent utilities distributed with other softwareBundled with
2Components of softwareImplemented as components of other legitimate softwareComponent of, as part of
3Drive-by downloadVisit web sites or download pages containing graywareDrive by
4Dropped by malwareSpread by other grayware such as downloadersDropped by
5Vulnerability exploitsExploits vulnerabilities such as buffer overflowVulnerability, loophole
6Instant messengersInstall via Instant messengers (IM) such as AOL and MSNInstant messaging
7Email and attachmentsEmbedded in emails and attachments to trick recipientsEmail
8Manually installationDirectly download from web sites or through FTP servicesManually install
9Peer-to-peerTransport in P2P applications such as Gnutella and KaZaAPeer-to-peer, p2p
10Network file sharesTrusted network share folders as propagation channelsNetwork share