A forum for reverse engineering, OS internals and malware analysis 

All off-topic discussion goes here.
 #4722  by Meriadoc
 Tue Jan 25, 2011 3:56 pm
By Design
Software Restriction Policies and AppLocker can be configured to whitelist DLLs. But LoadLibraryEx has a feature (LOAD_IGNORE_CODE_AUTHZ_LEVEL) to circumvent SRP and AppLocker - Didier Stevens
Create a New Process by Design
There’s an interesting comment on my Circumventing SRP and AppLocker, By Design post.

In my previous post, I showed a feature to circumvent SRP and AppLocker validation when a DLL is loaded.

The anonymous commenter points out a feature to create a new process, while circumventing SRP and AppLocker. Flag SANDBOX_INERT in function CreateRestrictedToken - Didier Stevens