Device drivers allow an operating system such as Windows to talk to hardware devices such as printers. Sophisticated attackers may dive deep into device drivers and manipulate them so that they undermine the security on your computer. They could also take control of the audio and video of the computer, stop your anti-virus software from running, or your data could be exposed to someone else. There are two main techniques for Driver Manipulation, and these are as follows:
- Shimming: A shim is a small library that transparently intercepts API calls and changes the arguments passed. They can also be used to run programs on different software platforms than they were developed for. Normally, it is used to help third-party software applications work with an operating system.
- Refactoring: Refactoring is the process of changing a computer program's internal structure...