Attacking the Antivirus:

icon

21

pages

icon

English

icon

Documents

Écrit par

Publié par

Lire un extrait
Lire un extrait

Obtenez un accès à la bibliothèque pour le consulter en ligne En savoir plus

Découvre YouScribe et accède à tout notre catalogue !

Je m'inscris

Découvre YouScribe et accède à tout notre catalogue !

Je m'inscris
icon

21

pages

icon

English

icon

Documents

Lire un extrait
Lire un extrait

Obtenez un accès à la bibliothèque pour le consulter en ligne En savoir plus

Attacking the Antivirus:
Voir icon arrow

Publié par

Langue

English

Attacking Antivirus
Feng Xue
Technical Lead, Nevis Labs.
Nevis Networks, Inc.
ABSTRACT Antivirus solutions are now a common component of computer systems. However, security issues pertaining to the antivirus software itself have not captured enough attentions of antivirus vendors and computer users.
This paper discusses why antivirus software is vulnerable to various attacks and why its security is so critical. It examines the tools and techniques, especially fuzzing techniques, used by attackers to expose vulnerabilities in antivirus solutions. It also looks at the ways in which attackers exploit these vulnerabilities
The paper thus aims to raise levels of consciousness about the security of the security product.
KEYWORDS :  Antivirus, Audit, Exploitation, Fuzzing, Security product
1. INTRODUCTION According to the U.S. national vulnerability database [1], as shown in Figure 1, 165 vulnerabilities have been reported in antivirus software in the past 4 years.
Antivirus Vulnerabilities
52 44
60
60 50 40 30 209 10 0 2004 2005 2006 2007
Figure 1  National Vulnerability Database
Thus, it is clear that antivirus software can be targeted just likes other components or services of computer systems.
Section 2 discusses why antivirus software is vulnerable to attacks. Section 3 discusses the techniques used to unravel vulnerabilities of antivirus software -- source code audits for example, or reverse engineering and fuzzing. Exploitation techniques will be examined in Section 4. .
Voir icon more
Alternate Text