首页> 外文期刊>Software >Antivirus security: naked during updates
【24h】

Antivirus security: naked during updates

机译:防病毒安全性:更新期间裸露

获取原文
获取原文并翻译 | 示例
       

摘要

The security of modern computer systems heavily depends on security tools, especially on antivirus software solutions. In the anti-malware research community, development of techniques for evading detection by antivirus software is an active research area. This has led to malware that can bypass or subvert antivirus software. The common strategies deployed include the use of obfuscated code and staged malware whose first instance (usually installer such as dropper and downloader) is not detected by the antivirus software. Increasingly, most of the modern malware are staged ones in order for them to be not detected by antivirus solutions at the early stage of intrusion. The installers then determine the method for further intrusion including antivirus bypassing techniques. Some malware target boot and/or shutdown time when antivirus software may be inactive so that they can perform their malicious activities. However, there can be another time frame where antivirus solutions may be inactive, namely, during the time of update. All antivirus software share a unique characteristic that they must be updated at a very high frequency to provide up-to-date protection of their system. In this paper, we suggest a novel attack vector that targets antivirus updates and show practical examples of how a system and antivirus software itself can be compromised during the update of antivirus software. Local privilege escalation using this vulnerability is also described. We have investigated this design vulnerability with several of the major antivirus software products such as Avira, AVG, McAfee, Microsoft, and Symantec and found that they are vulnerable to this new attack vector. The paper also discusses possible solutions that can be used to mitigate the attack in the existing versions of the antivirus software as well as in the future ones.
机译:现代计算机系统的安全性在很大程度上取决于安全工具,尤其是防病毒软件解决方案。在反恶意软件研究社区中,逃避防病毒软件检测技术的研究是活跃的研究领域。这导致恶意软件可以绕过或破坏防病毒软件。部署的常见策略包括使用混淆代码和分阶段的恶意软件,其防病毒软件未检测到其第一个实例(通常是安装程序,例如dropper和downloader)。越来越多的现代恶意软件是分段式的,以便在入侵的早期阶段不被防病毒解决方案检测到。然后,安装程序确定进一步入侵的方法,包括防病毒绕过技术。当防病毒软件可能处于非活动状态时,某些恶意软件会将启动和/或关闭时间作为目标,以便它们可以执行其恶意活动。但是,可能存在另一个时间段,其中防病毒解决方案可能处于非活动状态,即在更新期间。所有防病毒软件都有一个独特的特征,即必须以很高的频率进行更新,以提供对其系统的最新保护。在本文中,我们提出了一种针对防病毒更新的新型攻击媒介,并给出了在防病毒软件更新期间如何危害系统和防病毒软件本身的实际示例。还介绍了使用此漏洞的本地特权升级。我们已经使用几种主要的防病毒软件产品(例如Avira,AVG,McAfee,Microsoft和Symantec)调查了此设计漏洞,并发现它们容易受到此新攻击媒介的攻击。本文还讨论了可能的解决方案,这些解决方案可用于缓解现有版本以及将来的防病毒软件中的攻击。

著录项

  • 来源
    《Software》 |2014年第10期|1201-1222|共22页
  • 作者单位

    Information and Networked Systems Security Research, Faculty of Science, Macquarie University, Sydney, Australia;

    Information and Networked Systems Security Research, Faculty of Science, Macquarie University, Sydney, Australia;

    Information and Networked Systems Security Research, Faculty of Science, Macquarie University, Sydney, Australia;

    Information and Networked Systems Security Research, Faculty of Science, Macquarie University, Sydney, Australia;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    security; antivirus; malware; vulnerability; code execution; local privilege escalation; denial of service;

    机译:安全;防病毒恶意软件;脆弱性代码执行;本地特权升级;拒绝服务;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号