Such a thing does exist and it's called Windows Management Instrumentation (WMI).
With increased scrutiny from anti-virus and 'next-gen' host endpoints, advanced red teams and attackers already know that the introduction of binaries into a high-security environment is subject to increased scrutiny.
Over the years, XML has been a rich target for attackers due to flaws in its design as well as implementations.
It is a tempting target because it is used by other programming languages to interconnect applications and is supported by web browsers.
However certain industries, such as pay TV, are plagued by piracy and hardware counterfeits.
The threat of piracy was so great that pay TV manufacturers were forced to create extensive countermeasures to protect their smartcards in the field.
This talk covers the evolution of the Isolated Heap and Memory Protection mitigations, examines how they operate, and studies their weaknesses.The Four Horsemen of the Infocalypseterrorists, pedophiles, drug dealers, and money launderersare driving online policy as governments around the world are getting more deeply involved in the business of regulating the network.Meanwhile, the Next Billion Internet Users are going to connect from Asia and developing countries without a Bill of Rights.Centralization, Regulation, and Globalization are the key words, and over the next twenty years, we'll see these forces change digital networks and information security as we know it today.So where does that leave security, openness, innovation, and freedom?