Next: Java's Approach
Up: The Problem
Previous: What Needs Restrictions?
This section gives a few examples of scenarios that show what types of
attacks from malicious programs can occur. The classifications of
attacks will be the same as those mentioned in Section
2.1. Of course, this list of potential attacks is not
intended to be complete, but rather give a flavor of the types of
problems that can arise.
- Integrity Attacks
- Deletion/Modification of files.
- Modification of memory currently in use.
- Killing processes/threads.
- Availability Attacks
- Allocating large amounts of memory.
- Creating thousands of windows.
- Creating high priority processes/threads.
- Disclosure Attacks
- Mailing information about your machine (i.e. /etc/passwd).
- Sending personal or company files to an
adversary or competitor over the network.
- Annoyance Attacks
- Displaying obscene pictures on your screen.
- Playing unwanted sounds over your computer.