Abstract
In research conducted over the last year, we have concluded that the class
of attacks known as data driven attacks have become somewhat popular with
the interloper population. These attacks generally are transmitted in the
guise of an innocent data structure, such as a document, spreadsheet or
image, while in reality the data is an object in the modern sense. That is,
the data object consists of potentially passive and potentially active
portions, the latter generally acting as a collection of methods that
support viewing the passive portions of the object.