Research Article

Evaluating Grayware Characteristics and Risks

Table 8

Features used in the gray risk evaluation by the proposed framework.

Stage Feature Description Default scoring method

PenetrationAffected PlatformOperating systems (OSs) vulnerable to graywareNumber of OSs affected
Attack AvenueInstallation mechanisms to infect systemsNumber of attack channels
ActivationInformation ExposureExpose confidential informationLow: 1, Medium: 2, High: 3
Integrity ImpactImpact on system integrity and availabilityLow: 1, Medium: 2, High: 3
DestructivenessDamage file systems, stability, and productivityNo: 1, Yes: 2
Carried PayloadMalicious activities after invading victimsNumber of payloads
DiscoveryInformation EncryptionCryptographic methods employed by graywareNo: 1, Yes: 2
Memory ResidentStay at main memory after executionNo: 1, Yes: 2
EradicationRegistry KeyCreate registry keys to survive rebootNumber of registry keys
Manipulated FilesCreate/modify files to customize victim systemsNumber of created files