Research Article
Evaluating Grayware Characteristics and Risks
Table 8
Features used in the gray risk evaluation by the proposed framework.
| Stage | Feature | Description | Default scoring method |
| Penetration | Affected Platform | Operating systems (OSs) vulnerable to grayware | Number of OSs affected | Attack Avenue | Installation mechanisms to infect systems | Number of attack channels | Activation | Information Exposure | Expose confidential information | Low: 1, Medium: 2, High: 3 | Integrity Impact | Impact on system integrity and availability | Low: 1, Medium: 2, High: 3 | Destructiveness | Damage file systems, stability, and productivity | No: 1, Yes: 2 | Carried Payload | Malicious activities after invading victims | Number of payloads | Discovery | Information Encryption | Cryptographic methods employed by grayware | No: 1, Yes: 2 | Memory Resident | Stay at main memory after execution | No: 1, Yes: 2 | Eradication | Registry Key | Create registry keys to survive reboot | Number of registry keys | Manipulated Files | Create/modify files to customize victim systems | Number of created files |
|
|