Attacking Antivirus

نویسنده

  • Feng Xue
چکیده

Antivirus solutions are now a common component of computer systems. However, security issues pertaining to the antivirus software itself have not captured enough attentions of antivirus vendors and computer users. This paper discusses why antivirus software is vulnerable to various attacks and why its security is so critical. It examines the tools and techniques, especially fuzzing techniques, used by attackers to expose vulnerabilities in antivirus solutions. It also looks at the ways in which attackers exploit these vulnerabilities The paper thus aims to raise levels of consciousness about the security of the security product.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Formal Petri Net Based Model for Antivirus Update Agent System

In this paper, a formal model for antivirus update agent system is presented based on mobile agent technology and predicate/transition Petri nets. The mobile agent system contains two mobile agents called DCA and UNA. It sends out agents to update antivirus on client computers in a network. Each agent takes on a specified responsibility. First, DCA roams through the network and check the last d...

متن کامل

Attacking LCCC Batch Verification of RSA Signatures

Batch verification of digital signatures is used to improve the computational complexity when large number of digital signatures must be verified. Lee at al. [2] proposed a new method to identify bad signatures in batches efficiently. We show that the method is flawed.

متن کامل

A Formal Petri Net Based Model for Antivirus Update Agent System

In this paper, a formal model for antivirus update agent system is presented based on mobile agent technology and predicate/transition Petri nets. The mobile agent system contains two mobile agents called DCA and UNA. It sends out agents to update antivirus on client computers in a network. Each agent takes on a specified responsibility. First, DCA roams through the network and check the last d...

متن کامل

Mathematical Model on Attack of Worm and Virus in Computer Network

To curb the impact and transmission of worms and virus for simple mass action incidence rate in computer networks, SI1I2RS (Susceptible, Infectious due to worm, Infectious due to virus, Recovered and Susceptible) model have been formed. Basic reproduction number, endemic equilibrium state and their stability are discussed for the simple mass action incidence. For locally and globally asymptotic...

متن کامل

Counteracting DDoS attacks in multiple ISP domains using routing arbiter architecture

Today Distributed Denial of Service (DDoS) attacks are causing major threat to perform online business over the Internet. Our previous work proposed an automated model with a new packet marking technique and agent design to counteract DDoS within a single ISP domain. Our approach has many features that are required to minimize the DDoS attacks. For example, our model is invoked only during atta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008