منابع مشابه
Attacking Antivirus
Antivirus solutions are now a common component of computer systems. However, security issues pertaining to the antivirus software itself have not captured enough attentions of antivirus vendors and computer users. This paper discusses why antivirus software is vulnerable to various attacks and why its security is so critical. It examines the tools and techniques, especially fuzzing techniques, ...
متن کاملExploiting an antivirus interface
We propose a technique for defeating signature-based malware detectors by exploiting information disclosed by antivirus interfaces. This information is leveraged to reverse engineer relevant details of the detector’s underlying signature database, revealing binary obfuscations that suffice to conceal malware from the detector. Experiments with real malware and antivirus interfaces on Windows op...
متن کاملGrAVity: A Massively Parallel Antivirus Engine
In the ongoing arms race against malware, antivirus software is at the forefront, as one of the most important defense tools in our arsenal. Antivirus software is flexible enough to be deployed from regular users desktops, to corporate e-mail proxies and file servers. Unfortunately, the signatures necessary to detect incoming malware number in the tens of thousands. To make matters worse, antiv...
متن کاملA Scalable , High - Availability Antivirus Solution : A High - performance , High - availability , Antivirus and Content Security Clustering Solution
InterScan, VirusW all, eManager, MacroTrap and SoftMice are trademarks or registered trademarks of Trend Micro, Inc. StoneBeat, FullCluster and SecurityCluster are trademarks or registered trademarks of Stonesoft Inc. Any other trademarks or registered trademarks referenced in this document are the property of their respective owners.
متن کاملAntivirus performance characterisation: system-wide view
Cyber security threats are still big concerns of the cyber world. Even though many defense techniques have been proposed and used so far, the antivirus (AV) software is very widely used and recommended for the end-usersPC community. Most effective AV products are commercial and thus competitive and it is not obvious for security researchers or system developers how exactly the AV works or how i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Science
سال: 2005
ISSN: 0036-8075,1095-9203
DOI: 10.1126/science.309.5743.1969b