Summary
UAC protection plays an important role in modern Windows. Many Windows security measures are based on UAC protection as a security perimeter to work properly – for example, Windows firewall protection. In this chapter, we presented a complete analysis of Windows 10 UAC protection, the authentication process, and several known attacks in a reverse-engineered way. However, as the battle for Windows security continues, it is possible that these problems will be fixed in the future and that other new attack scenarios will emerge.