Results 1 to 4 of 4

Thread: Reliance on AV products isn't a good idea

  1. #1
    Seething Cauldron of Hatred TheAnimus's Avatar
    Join Date
    Aug 2005
    Posts
    17,168
    Thanks
    803
    Thanked
    2,152 times in 1,408 posts

    Reliance on AV products isn't a good idea

    http://www.theregister.co.uk/2010/05...tch_av_bypass/

    Most Anti-Virus systems on windows work by "hooking" that is to say intercepting the calls made between a users program, for example a web browser, and the underlying operating system.

    Be it Linux, Windows or BSD, there are a bunch of services offered by the kernel to the users program. A virus scanner can look at how it uses these often to determine if something is potentially dangerous, if so it will read the whole program and analyse it for know patterns.

    But if you've got a multi-core system, you can effect have someone manipulating the program, whilst its been inspected, simultaneously.

    Its quite a hard one to solve because most attacks are not concurrent right now, its very very hard to understand all of the possible attack vectors. There was a really interesting paper a few months back about how certain cryptographic concepts can be spied upon by looking at the voltage fluctuations, and a very in depth understanding of the structure of the cores on the CPU.

    Back in the first old days of the net, most machines where left pretty much open, telnet on standard ports. People slowly came about (MS slower noteably than others!) to realising the importance of spending time and limiting functionality.

    But this could be a bit brave new world, as it makes obfuscation from the heuristic scanners a lot harder.

    This might just bore everyone here, but hopefully some will find it interesting....
    throw new ArgumentException (String, String, Exception)

  2. #2
    Registered+
    Join Date
    Jul 2009
    Posts
    21
    Thanks
    0
    Thanked
    0 times in 0 posts

    Re: Reliance on AV products isn't a good idea

    Could you please provide a link to a document you mentioned you read few months ago...

  3. #3
    Mike Fishcake
    Guest

    Re: Reliance on AV products isn't a good idea

    Extremely interested in this type of thing - we're (finally) starting a technical advisory group to deal with viruses in our organisation, so I need to keep track about stuff like this.

  4. #4
    Senior Member
    Join Date
    Mar 2005
    Posts
    4,941
    Thanks
    171
    Thanked
    386 times in 313 posts
    • badass's system
      • Motherboard:
      • ASUS P8Z77-m pro
      • CPU:
      • Core i5 3570K
      • Memory:
      • 32GB
      • Storage:
      • 1TB Samsung 850 EVO, 2TB WD Green
      • Graphics card(s):
      • Radeon RX 580
      • PSU:
      • Corsair HX520W
      • Case:
      • Silverstone SG02-F
      • Operating System:
      • Windows 10 X64
      • Monitor(s):
      • Del U2311, LG226WTQ
      • Internet:
      • 80/20 FTTC

    Re: Reliance on AV products isn't a good idea

    Quote Originally Posted by TheAnimus View Post
    http://www.theregister.co.uk/2010/05...tch_av_bypass/

    Most Anti-Virus systems on windows work by "hooking" that is to say intercepting the calls made between a users program, for example a web browser, and the underlying operating system.

    Be it Linux, Windows or BSD, there are a bunch of services offered by the kernel to the users program. A virus scanner can look at how it uses these often to determine if something is potentially dangerous, if so it will read the whole program and analyse it for know patterns.

    But if you've got a multi-core system, you can effect have someone manipulating the program, whilst its been inspected, simultaneously.

    Its quite a hard one to solve because most attacks are not concurrent right now, its very very hard to understand all of the possible attack vectors. There was a really interesting paper a few months back about how certain cryptographic concepts can be spied upon by looking at the voltage fluctuations, and a very in depth understanding of the structure of the cores on the CPU.

    Back in the first old days of the net, most machines where left pretty much open, telnet on standard ports. People slowly came about (MS slower noteably than others!) to realising the importance of spending time and limiting functionality.

    But this could be a bit brave new world, as it makes obfuscation from the heuristic scanners a lot harder.

    This might just bore everyone here, but hopefully some will find it interesting....
    The risks from these kinds of attacks can be hugely reduced by having proper endpoint security (in a business setup) and a layered security model.
    Your security software is not capable of running the data it is inspecting - it is only checking it before passing it on to the host.
    By the time an email gets to our users desktop, it has been scanned for viruses azt least twice adn a further time by the desktop A/V.

    This type of attack can only bypass the desktop A/V.

    A redesign of A/V software can also reduce the risk. Most email scanners for example scan outgoing email by running an SMTP server on your PC that your email client is configured to use as a smarthost. They can have the A/V software run a proxy server on your PC and your web browsers all access the web throught the proxy server. for all other network/internet access, they can run a security appliance style program that intercepts all network traffic incoming and outgoing and only passes it on once scanned. This only leaves local attacks being able to exploit this loophole.
    "In a perfect world... spammers would get caught, go to jail, and share a cell with many men who have enlarged their penises, taken Viagra and are looking for a new relationship."

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Building your own PC: Noobs Guide Idea?
    By cptwhite_uk in forum PC Hardware and Components
    Replies: 8
    Last Post: 08-03-2009, 07:09 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •