SlideShare ist ein Scribd-Unternehmen logo
1 von 47
Downloaden Sie, um offline zu lesen
Embeddable AntiVirus engine with high granularity
----------
our understanding and dream



        seak
        Seak@antiy.net
Syllabus

• Challenges to AV Principles
• High granularity processing
• Embeddable AV Engine




                  Antiy Labs www.antiy.net
Challenges to AV Principles
AV Principles

• AV is not simply a technological battlefront. The
  overall AV system takes in many logical and
  legal factors. There are also project planning
  factors which have some basic principles in
  common.
• These common principles can be objectively
  summarized from the AV practice, and then
  applied to guide the design of an AV engine and
  tools.
• In 1995 we summarized the basic common
  principles in 44 items, informally named AV
  dialectics.
                   Antiy Labs www.antiy.net
Some Important Items

•   A computer virus is a kind of          •   The clean up of a virus is the
                                               reverse of its infection
    program in the final analysis
                                           •   User’s rights to the AV software:
•   The features of a computer virus           Right to decide: Users can
    are the only identifiers to classify       customize the functionality of the
    the virus                                  AV software instead of using the
                                               default configuration
•   The crucial criterion in judging a
                                               Right to know: Users should know
    program to be a virus should be its        what the AV software has done in
    features or some characteristics of        the system
    the content                                Right to backup: Users should be
•   The only reason that feature code          provided with means to backup
                                               infected files
    should be purged is if it is
                                           •   Software should detect viruses
    objectively or subjectively harmful        inside packages and clean viruses
•   Whether a certain program should           without deleting the package if
    be classified as a virus or not            authorized
    should be based on clear criteria      •   Precaution principle: Virus
                                               monitoring should prevent the
                                               infected files from running and
                                               taking control of the system

                              Antiy Labs www.antiy.net
AV Dialectics

• With the development of both the application
  environment and virus techniques, many of our
  above stated points began to contradict each
  other
• The fundamental reason for these contradictions
  is the complication of information systems




                  Antiy Labs www.antiy.net
Challenge 1:Puzzling
                                         Criterion


• Item: The crucial criterion of a computer virus
  should be the feature code or some
  characteristics of the content
• Exception: CMD backdoor left by Code Red
• Question: Traditional AV technologies deal
  with “Yes or No” problems, where the only
  criterion is the content of the program. But
  under some circumstances, the boundary
  between harmful and harmless becomes
  vague.
                 Antiy Labs www.antiy.net
Challenge 2:Paradox of
                                         Range
• Item: Whether a certain program should be
  detected or not should be based on clear criteria
• Exception: psexec tool used in Worm.Dvldr .
• Question: The emergence of unwanted files is
  another puzzle in detection criterion. How far
  should AV software reach? What is the criterion?
  So far, many AV products include adware
  detection, is this reasonable or legal?




                  Antiy Labs www.antiy.net
Challenge 3:Package
                                            Enigma
• Item: Detect viruses inside packages and clean
  viruses without deleting the package if
  authorized
• Exception:DIY worms (such as password
  worms), and worms using or saving in zip
  formats (such as some variation of netsky)
• Question: The basic assumption of traditional AV
  software is that a package file is normal file that
  may contain a virus. DIY worms are self-
  extracting packages. Some worms make many
  zipped backup copies on the disk which cannot
  be removed by AV software.
                   Antiy Labs www.antiy.net
Challenge 4: Junk Files

• Item: The only reason that feature code should
  be purged is if it is objectively or subjectively
  harmful
• Exception: Crisis caused by unofficial evaluation
• Problem: If one company detects some trivial
  files, other companies will follow suit in order to
  win higher marks in competitive evaluation. Is
  this worthwhile behavior? How can it be
  balanced with efficient and high-throughput virus
  detection?

                   Antiy Labs www.antiy.net
Challenge 5:
                               Responsibility problem
• Item: The clean up of a virus is the reverse of its
  infection
• Case: Leftover backdoors leading to a worm
  returning
• Question: Is AV software responsible for
  recovering all the system modifications made by
  the virus? And how to deal with leaks? Is this
  work endless?




                   Antiy Labs www.antiy.net
Challenge 6:The time of
                                           action
• Item: Virus monitoring should prevent infected
  files from running and taking control of the
  system
• Case: Arguments on file evaluation
• Question: Since it is difficult to detect unknown
  PE viruses, Trojans or backdoors, should the
  heuristic report based on behavior be acted on
  immediately?




                   Antiy Labs www.antiy.net
Challenge 7:Active
                                             Protection
• Item: User’s rights to the AV software
• Case: scanning worms changed the image
       of victims
• Question: At first, viruses aimed simply to infect
  users’ systems. Now, more often than not, they
  try to make infected systems further infect other
  systems. In such a case, can a virus be removed
  without the user’s permission? What means are
  acceptable? Is this a technological question or
  legal question?

                   Antiy Labs www.antiy.net
Putting forward and solving
                                   the problems
• None of these problems are too difficult to be
  solved technologically
• Some of them concern style and morals,
  however “Puzzling Criterion”, “Package
  Enigma”, and the “Responsibility Problem” are
  reactions to the traditional system and
  framework of the AV engine.
• We need more adaptive and reasonable engine
  frameworks instead of expediency in
  programming

                  Antiy Labs www.antiy.net
High Granularity Processing
The three elements of an
                                 AV Engine



           AV Engine




Database                      Config




           Antiy Labs www.antiy.net
The three elements of an
                                            AV Engine



The three elements of an AV engine are the engine, database,
and configuration. The engine relies on the database to detect,
and the definitions in the configuration to work.
Before, we put much emphasis on the engine. Now, we need to
pay more attention to the configuration to see what gains it has
to offer us.
We also need to reevaluate the database – the maintenance of
which is traditionally mechanical – to see whether the potential
for creativity still exists.
                      Antiy Labs www.antiy.net
The Traditional Database

                 Type 1       Type 2             Type 3   Type 4

Number           √            √                  √        √

Mod num          √            √                  √        √

Virus name       √            √                  √        √

First word of                                    √        √
Feature code
Offset1+Sign 1                                   √        √

Offset2+Sign 2                                   √        √

File type flag                                            √

Process arg      √                               √        √

Processing                                       √        √
module name
                          Antiy Labs www.antiy.net
The Traditional Database

• In working with a database, 95% of viruses are
  detected via records of type 3 and type 4
  (featuring code detection). Detecting the
  remaining 5% of special viruses is done with
  records of type 1 and type 2 (independent
  module detection).
• Over 80% of viruses are processed via
  argument, and the remaining 20% via
  processing module。



                  Antiy Labs www.antiy.net
Basic characteristics of the
                              traditional Database
• Object Control: what to detect
• Behavior Control: how to process
• Effectiveness Control: intensity of detection




                   Antiy Labs www.antiy.net
Traditional Configuration
                                            Means
• Flow control (Program)
• Debug Switch (Developer)
• INI control (User)




                 Antiy Labs www.antiy.net
Object Control
•   Memory=Yes; check the memory
•   Sectors=Yes; check the boot sector
•   Files=Yes; check file system
•   Packed=Yes; check packages
•   Archives=Yes; check archives
•   MailBases=Yes; check emails
•   MailPlain=Yes; check encoded files
•   FileMask=2; check the extended names
•   UserMask= ?; user defined extension
•   Exclude=No; Don’t check customized extensions
•   ExcludeMask= ; Don’t check definition of extensions


                    Antiy Labs www.antiy.net
Behavior Control

•   InfectedAction=0; remove viruses
•   InfectedCopy=No; back up viruses
•   InfectedFolder=Infected; back up folders
•   SuspiciousCopy=No; back up suspicious files
•   SuspiciousFolder=Suspicious; back up folders
•   Report=Yes; generate logs
•   ReportFileName=Report.txt; name of log file




                   Antiy Labs www.antiy.net
Effectiveness Control

• Warnings=Yes; Show warnings
• CodeAnalyzer=Yes; Open the code analyzer
• RedundantScan=Yes; Redundant scanning




                Antiy Labs www.antiy.net
That’s enough?

• In the traditional AV environment, this kind of
  granularity is enough for control, however
  problems occur when it comes to more
  complicated environments.




                   Antiy Labs www.antiy.net
Application Case 1
• Consider what different features the engine will have when
  working as AV software for a single computer VS working as
  one module in a mail server?
• I-Worm.Nimda.e is a infective worm. When processed locally, it
  should be regarded as a PE infected file, but for a mail server, it
  should simply be discarded.
• Win95.CIH is a infective virus. When detected, whether it is local
  or on mail server, it should be processed as an infected virus
  and the original file should be recovered.
• The essential difference is that Win95.CIH doesn’t mail itself but
  rather is an executable program mailed by the user, while
  Nimda behaves contrarily.
• This situation requires different processes for different kinds of
  viruses in various environments, it is beyond the capacity of
  traditional engine control.



                        Antiy Labs www.antiy.net
Application Case 2
• Network virus detection
  equipment contains several         • Email detection
  responding modules
• What policy should these
                                     • Duplicate email
  responding modules work              detection
  with?                              • Feedback email
• Some mail worms create
  addressees randomly, what            detection
  will happen if sending             • Reset connection
  creates a feedback loop?
• Some mail worms use bots
  to create addressees. What
  will happen if the worm starts
  sending duplicates?



                        Antiy Labs www.antiy.net
Requirements from Engine
                                                                         User

            SMTP detection                                          POP3 detection




            Faked            True        True         Faked         Faked            True          True        False
            Recipient        Recipient   Sender       Sender        Recipient        Recipient     Sender      Sender




Feedback                                 effective    ineffective                                  effective   ineffective
Detection




Duplicate   ineffective      effective                              effective        ineffective
Detection




                                              Antiy Labs www.antiy.net
Application Case 3

• Integration with               • Different processing for
  networking equipment is          scanning worms and mail
  an effective response.           worms.
• See: OPSEC, TOPSEC             • It is simple to scan worm
                                   infection IP nodes. But if
                                   we do the same to email
                                   worms, they may send
                                   the same email over and
                                   over again causing DoS
                                 • We should check whether
                                   there is a proxy server on
                                   the network

                    Antiy Labs www.antiy.net
That’s not enough!

• New demand goes beyond the capacity of the
  traditional engine
• How can we solve this problem?




                 Antiy Labs www.antiy.net
Embeddable AV engine with high granularity
Putting Forward the
                                               Question
• The trending movement of network security
  products implies that virus filtering mechanisms
  will extend to equipment at different levels
• The above discussion shows the need for the
  AV engine to adapt to more complicated
  environments
• Embedded equipment or AV engines in other
  environments are designed for high granularity




                  Antiy Labs www.antiy.net
Application of Embedded
                                                       Engine
Application Form           Details


AV module in Firewall      Construct linear speed virus filtering module for package filtering
                           firewall with a network engine.
                           Construct file stream virus filter for app proxies, transparent
                           proxies or a stream filtering firewall with a file engine.
AV module in router        Add virus filtering ability to routing equipment with high speed
                           package level scanning

AV module in switch        Add virus filtering ability to switching equipment with high speed
                           packet scanning.

Virus detecting plug-ins   Extend the network engine to provide the IDS with network virus
in IDS                     detection ability

AV module in GAP           Extend GAP equipment with virus filtering ability
device

Virus protection in mail   Embed virus detection ability into mail servers
system

Independent AV software    User need only to program against an API to develop their own AV
                           software
                             Antiy Labs www.antiy.net
Basic Requirement 1:
                                        Memory Engine



                        Object
 Report



Peripheral            I/O module
Processing



                       Memory
   Result
                       Object



             AV Engine
                  Antiy Labs www.antiy.net
Memory Engine Interface
                                                                Demo
/*scanning parameter structure */
typedef struct _AVLF_SDK_SCAN_PARA
{
char * pBuffer;                   /* pointer to buffer */
unsigned long ulSize;             /*size of the buffer */
const char * pDescription;        /* description information */
int bUnpack;                      /* whether to unpack*/
int bKill;                        /* whether to kill the virus */
int bKilled;                      /* whether virus was killed successfully*/
} AVLF_SDK_SCAN_PARA,*PAVLF_SDK_SCAN_PARA;

/* set the receiver */
AVLEACHSDK_API int AVLF_SDK_SetReciver(IReportReciver *pReciver);

/*scanning:return 0 if no virus detected,return 1 if virus found,detailed information is received by
    the receiver class*/

AVLEACHSDK_API int AVLF_SDK_Scan(PAVLF_SDK_SCAN_PARA pParamter);



                                      Antiy Labs www.antiy.net
Basic Requirement 2——
                                Recursive Engine
• Modern AV engines have evolved from
  branched engines led by module-based format
  recognition to recursive engines
• In a recursive engine, scanned objects could
  have multiple flags, which can be detected by
  corresponding modules
• McAfee’s bug in detecting SFX
• archbomb.zip



                  Antiy Labs www.antiy.net
Archbomb.zip DoS AVware




Antiy Labs www.antiy.net
How to detect archbomb.zip


                                              sign1
                                              Offset: 4h
                                              Length: 7h




                                              Sign 2
                                             Offset:300h
                                             Length:F0h




        A Zip which is also a binary stream could be
        detected by binary engine instead of what would
        be done in the traditional branched engine –
        being passed to archive extracting module by the
Antiy Labs www.antiy.net
        format recognition module.
Example——
                                                                             Recursive Engine
                                                                                   1. Analyzers are
                                                                                      parallel in
                                                                                      structure, none are
                                                                                      prerequisites.
              IConfig                         IComponent
                                                Factory
                                                                                   2. Results from the
                                                                                      analyzers can
                                                                                      provide different
                                         IEngine
                                                                                      priority ratings,
  SDK
                                        AnalyseData                                   with viruses listed
                                                                       Analyser1
                                                                                      as the highest and
                         IComponent                                                   files needing
                          Manager                          Analyser2                  further processing
Component
                                                                                      as the lowest
   N                                           AnalyserN
                                                                                   3. In principle,
            Component2
                                 Component1
                                                                                      analyzers work
                                                                                      serially, with
                                                                                      higher priority
                                                                                      results being
                                              Antiy Labs www.antiy.net                forwarded.
Basic Requirement 3——
                                 portable engine
• Working environment could be the x86
  architecture, or other architectures like PPC
• Modules written in x86 assembly language are a
  barrier to porting to other architectures.




                 Antiy Labs www.antiy.net
Basic Requirement 4——
                       Highly Controllable Engine
• What are the essential requirements for high
  granularity?
• Virus processing in different environments
  cannot only rely on detecting the infection
  feature but also the “specialty” of the virus.
• The granularity of control needs to reach the
  individual virus, the database needs to provide
  more information.
• Virus processing will be done with information
  from the database about the virus specialty.

                  Antiy Labs www.antiy.net
Control Level

•   Flow control (Program)
•   Debug Switch (Developer)
•   INI control (User)                    •   Flow control (Program)
                                          •   Virus attribute
                                          •   Debug Switch (Developer)
                                          •   Stencil (Condition)
                                          •   INI control (User)




                          Antiy Labs www.antiy.net
Traditional Database V.S. High
                                Granularity Database
struct vxdb                     struct tgvxdb
{                               {
char name[255];                 char name[255];
char fword[4];                  char fword[4];
char offset1[4];                char offset1[4];
char crc1[8];                   char crc1[8];
char offset2[4];                char offset2[4];
char crc2[8];                   char crc2[8];
…                               …
};                              int vxattribute ;
                                };

                   Antiy Labs www.antiy.net
Basic Requirement 5——
                     Precise Processing Engine
• Perfect reverse engineering is the end goal.
• The High Granularity Engine ends the era in
  which the AV company does not need to analyze
  the virus.




                 Antiy Labs www.antiy.net
How to Process

•   Clean com tail                    • On the left is the cleaning
•   Clean com head                      parameter set which is
•   Clean exe tail
                                        widely accepted by many
•   Clean ne tail
•   Clean pe tail
                                        companies.
•   Remove file                       • We need the same
•   Copy data block                     detailed processing script
•   Move data block                     for non-infective viruses
•   Insert data block
                                      • Is this work endless?
•   Modify data block
•   Delete data block
•   Fill in data block
•   Truncate data tail
•   Truncate data head


                         Antiy Labs www.antiy.net
Our Model




Antiy Labs www.antiy.net
Our Understanding and
                                            Dream
• AV principles are not invariable. Instead, they
  are evolving dynamic principles. They require
  not only summarizing but also supplementing
  and replacing.
• We believe in our understanding and we persist
  in our dream.
• Thank you!




                  Antiy Labs www.antiy.net

Weitere ähnliche Inhalte

Was ist angesagt?

Fuzzing101 uvm-reporting-and-mitigation-2011-02-10
Fuzzing101 uvm-reporting-and-mitigation-2011-02-10Fuzzing101 uvm-reporting-and-mitigation-2011-02-10
Fuzzing101 uvm-reporting-and-mitigation-2011-02-10Codenomicon
 
Native Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on AndroidNative Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on AndroidFraunhofer AISEC
 
Bh us 11_tsai_pan_weapons_targeted_attack_wp
Bh us 11_tsai_pan_weapons_targeted_attack_wpBh us 11_tsai_pan_weapons_targeted_attack_wp
Bh us 11_tsai_pan_weapons_targeted_attack_wpgeeksec80
 
Security Technology Arms Race - Hack in the Box 2021 keynote
Security Technology Arms Race - Hack in the Box 2021 keynoteSecurity Technology Arms Race - Hack in the Box 2021 keynote
Security Technology Arms Race - Hack in the Box 2021 keynoteMarkDowd13
 
Machine Learning for Malware Classification and Clustering
Machine Learning for Malware Classification and ClusteringMachine Learning for Malware Classification and Clustering
Machine Learning for Malware Classification and ClusteringAshwini Almad
 
IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies
IoT Malware: Comprehensive Survey, Analysis Framework and Case StudiesIoT Malware: Comprehensive Survey, Analysis Framework and Case Studies
IoT Malware: Comprehensive Survey, Analysis Framework and Case StudiesPriyanka Aash
 
Full stack vulnerability management at scale
Full stack vulnerability management at scaleFull stack vulnerability management at scale
Full stack vulnerability management at scaleEoin Keary
 
AppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsAppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsCheckmarx
 

Was ist angesagt? (9)

Fuzzing101 uvm-reporting-and-mitigation-2011-02-10
Fuzzing101 uvm-reporting-and-mitigation-2011-02-10Fuzzing101 uvm-reporting-and-mitigation-2011-02-10
Fuzzing101 uvm-reporting-and-mitigation-2011-02-10
 
Native Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on AndroidNative Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on Android
 
Bh us 11_tsai_pan_weapons_targeted_attack_wp
Bh us 11_tsai_pan_weapons_targeted_attack_wpBh us 11_tsai_pan_weapons_targeted_attack_wp
Bh us 11_tsai_pan_weapons_targeted_attack_wp
 
Security Technology Arms Race - Hack in the Box 2021 keynote
Security Technology Arms Race - Hack in the Box 2021 keynoteSecurity Technology Arms Race - Hack in the Box 2021 keynote
Security Technology Arms Race - Hack in the Box 2021 keynote
 
Avc fdt 201303_en
Avc fdt 201303_enAvc fdt 201303_en
Avc fdt 201303_en
 
Machine Learning for Malware Classification and Clustering
Machine Learning for Malware Classification and ClusteringMachine Learning for Malware Classification and Clustering
Machine Learning for Malware Classification and Clustering
 
IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies
IoT Malware: Comprehensive Survey, Analysis Framework and Case StudiesIoT Malware: Comprehensive Survey, Analysis Framework and Case Studies
IoT Malware: Comprehensive Survey, Analysis Framework and Case Studies
 
Full stack vulnerability management at scale
Full stack vulnerability management at scaleFull stack vulnerability management at scale
Full stack vulnerability management at scale
 
AppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOpsAppSec How-To: Achieving Security in DevOps
AppSec How-To: Achieving Security in DevOps
 

Ähnlich wie Embeddable Antivirus engine with high granularity

Virus Detection Based on the Packet Flow
Virus Detection Based on the Packet FlowVirus Detection Based on the Packet Flow
Virus Detection Based on the Packet FlowAntiy Labs
 
PE Trojan Detection Based on the Assessment of Static File Features
PE Trojan Detection Based on the Assessment of Static File FeaturesPE Trojan Detection Based on the Assessment of Static File Features
PE Trojan Detection Based on the Assessment of Static File FeaturesAntiy Labs
 
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detectionAnti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detectionNeel Pathak
 
Is av dead or just missing in action - avar2016
Is av dead or just missing in action - avar2016Is av dead or just missing in action - avar2016
Is av dead or just missing in action - avar2016rajeshnikam
 
Design and Development of an Efficient Malware Detection Using ML
Design and Development of an Efficient Malware Detection Using MLDesign and Development of an Efficient Malware Detection Using ML
Design and Development of an Efficient Malware Detection Using MLSiva krishnam raju Patsamatla
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Securitysedukull
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment TechniquesDenim Group
 
Failure Of Antivirus
Failure Of AntivirusFailure Of Antivirus
Failure Of Antivirusamarnath
 
NextGen Endpoint Security for Dummies
NextGen Endpoint Security for DummiesNextGen Endpoint Security for Dummies
NextGen Endpoint Security for DummiesAtif Ghauri
 
Jason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional ToolsJason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional Toolscentralohioissa
 
Malware Collection and Analysis via Hardware Virtualization
Malware Collection and Analysis via Hardware VirtualizationMalware Collection and Analysis via Hardware Virtualization
Malware Collection and Analysis via Hardware VirtualizationTamas K Lengyel
 
Bringing Patch Management to Spiceworks
Bringing Patch Management to SpiceworksBringing Patch Management to Spiceworks
Bringing Patch Management to SpiceworksSpiceworks
 
Rolling Out An Enterprise Source Code Review Program
Rolling Out An Enterprise Source Code Review ProgramRolling Out An Enterprise Source Code Review Program
Rolling Out An Enterprise Source Code Review ProgramDenim Group
 
chap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information Systemschap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information SystemsKashfUlHuda1
 
Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsUnderstand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsRahul Mohandas
 
Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsUnderstand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsRahul Mohandas
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4Lisa Niles
 
Open Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesOpen Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesBlack Duck by Synopsys
 

Ähnlich wie Embeddable Antivirus engine with high granularity (20)

Virus Detection Based on the Packet Flow
Virus Detection Based on the Packet FlowVirus Detection Based on the Packet Flow
Virus Detection Based on the Packet Flow
 
PE Trojan Detection Based on the Assessment of Static File Features
PE Trojan Detection Based on the Assessment of Static File FeaturesPE Trojan Detection Based on the Assessment of Static File Features
PE Trojan Detection Based on the Assessment of Static File Features
 
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detectionAnti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
 
Is av dead or just missing in action - avar2016
Is av dead or just missing in action - avar2016Is av dead or just missing in action - avar2016
Is av dead or just missing in action - avar2016
 
Design and Development of an Efficient Malware Detection Using ML
Design and Development of an Efficient Malware Detection Using MLDesign and Development of an Efficient Malware Detection Using ML
Design and Development of an Efficient Malware Detection Using ML
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Code Quality - Security
Code Quality - SecurityCode Quality - Security
Code Quality - Security
 
Application Assessment Techniques
Application Assessment TechniquesApplication Assessment Techniques
Application Assessment Techniques
 
Failure Of Antivirus
Failure Of AntivirusFailure Of Antivirus
Failure Of Antivirus
 
NextGen Endpoint Security for Dummies
NextGen Endpoint Security for DummiesNextGen Endpoint Security for Dummies
NextGen Endpoint Security for Dummies
 
Jason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional ToolsJason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional Tools
 
Malware Collection and Analysis via Hardware Virtualization
Malware Collection and Analysis via Hardware VirtualizationMalware Collection and Analysis via Hardware Virtualization
Malware Collection and Analysis via Hardware Virtualization
 
Bringing Patch Management to Spiceworks
Bringing Patch Management to SpiceworksBringing Patch Management to Spiceworks
Bringing Patch Management to Spiceworks
 
Rolling Out An Enterprise Source Code Review Program
Rolling Out An Enterprise Source Code Review ProgramRolling Out An Enterprise Source Code Review Program
Rolling Out An Enterprise Source Code Review Program
 
chap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information Systemschap-1 : Vulnerabilities in Information Systems
chap-1 : Vulnerabilities in Information Systems
 
Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsUnderstand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day Threats
 
Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsUnderstand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day Threats
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #4
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #4
 
Open Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesOpen Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best Practices
 

Mehr von Antiy Labs

Malware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial ViewMalware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial ViewAntiy Labs
 
Development, Confusion and Exploration of Honeypot Technology
Development, Confusion and Exploration of Honeypot TechnologyDevelopment, Confusion and Exploration of Honeypot Technology
Development, Confusion and Exploration of Honeypot TechnologyAntiy Labs
 
Data Storage and Security Strategies of Network Identity
Data Storage and Security Strategies of Network IdentityData Storage and Security Strategies of Network Identity
Data Storage and Security Strategies of Network IdentityAntiy Labs
 
Security Challenges of Antivirus Engines, Products and Systems
Security Challenges of Antivirus Engines, Products and SystemsSecurity Challenges of Antivirus Engines, Products and Systems
Security Challenges of Antivirus Engines, Products and SystemsAntiy Labs
 
The Evolution Theory of Malware and Our Thought
The Evolution Theory of Malware and Our ThoughtThe Evolution Theory of Malware and Our Thought
The Evolution Theory of Malware and Our Thought Antiy Labs
 
Virus Detection System
Virus Detection SystemVirus Detection System
Virus Detection SystemAntiy Labs
 

Mehr von Antiy Labs (6)

Malware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial ViewMalware in Mobile Platform from Panoramic Industrial View
Malware in Mobile Platform from Panoramic Industrial View
 
Development, Confusion and Exploration of Honeypot Technology
Development, Confusion and Exploration of Honeypot TechnologyDevelopment, Confusion and Exploration of Honeypot Technology
Development, Confusion and Exploration of Honeypot Technology
 
Data Storage and Security Strategies of Network Identity
Data Storage and Security Strategies of Network IdentityData Storage and Security Strategies of Network Identity
Data Storage and Security Strategies of Network Identity
 
Security Challenges of Antivirus Engines, Products and Systems
Security Challenges of Antivirus Engines, Products and SystemsSecurity Challenges of Antivirus Engines, Products and Systems
Security Challenges of Antivirus Engines, Products and Systems
 
The Evolution Theory of Malware and Our Thought
The Evolution Theory of Malware and Our ThoughtThe Evolution Theory of Malware and Our Thought
The Evolution Theory of Malware and Our Thought
 
Virus Detection System
Virus Detection SystemVirus Detection System
Virus Detection System
 

Kürzlich hochgeladen

9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 

Kürzlich hochgeladen (20)

9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 

Embeddable Antivirus engine with high granularity

  • 1. Embeddable AntiVirus engine with high granularity ---------- our understanding and dream seak Seak@antiy.net
  • 2. Syllabus • Challenges to AV Principles • High granularity processing • Embeddable AV Engine Antiy Labs www.antiy.net
  • 3. Challenges to AV Principles
  • 4. AV Principles • AV is not simply a technological battlefront. The overall AV system takes in many logical and legal factors. There are also project planning factors which have some basic principles in common. • These common principles can be objectively summarized from the AV practice, and then applied to guide the design of an AV engine and tools. • In 1995 we summarized the basic common principles in 44 items, informally named AV dialectics. Antiy Labs www.antiy.net
  • 5. Some Important Items • A computer virus is a kind of • The clean up of a virus is the reverse of its infection program in the final analysis • User’s rights to the AV software: • The features of a computer virus Right to decide: Users can are the only identifiers to classify customize the functionality of the the virus AV software instead of using the default configuration • The crucial criterion in judging a Right to know: Users should know program to be a virus should be its what the AV software has done in features or some characteristics of the system the content Right to backup: Users should be • The only reason that feature code provided with means to backup infected files should be purged is if it is • Software should detect viruses objectively or subjectively harmful inside packages and clean viruses • Whether a certain program should without deleting the package if be classified as a virus or not authorized should be based on clear criteria • Precaution principle: Virus monitoring should prevent the infected files from running and taking control of the system Antiy Labs www.antiy.net
  • 6. AV Dialectics • With the development of both the application environment and virus techniques, many of our above stated points began to contradict each other • The fundamental reason for these contradictions is the complication of information systems Antiy Labs www.antiy.net
  • 7. Challenge 1:Puzzling Criterion • Item: The crucial criterion of a computer virus should be the feature code or some characteristics of the content • Exception: CMD backdoor left by Code Red • Question: Traditional AV technologies deal with “Yes or No” problems, where the only criterion is the content of the program. But under some circumstances, the boundary between harmful and harmless becomes vague. Antiy Labs www.antiy.net
  • 8. Challenge 2:Paradox of Range • Item: Whether a certain program should be detected or not should be based on clear criteria • Exception: psexec tool used in Worm.Dvldr . • Question: The emergence of unwanted files is another puzzle in detection criterion. How far should AV software reach? What is the criterion? So far, many AV products include adware detection, is this reasonable or legal? Antiy Labs www.antiy.net
  • 9. Challenge 3:Package Enigma • Item: Detect viruses inside packages and clean viruses without deleting the package if authorized • Exception:DIY worms (such as password worms), and worms using or saving in zip formats (such as some variation of netsky) • Question: The basic assumption of traditional AV software is that a package file is normal file that may contain a virus. DIY worms are self- extracting packages. Some worms make many zipped backup copies on the disk which cannot be removed by AV software. Antiy Labs www.antiy.net
  • 10. Challenge 4: Junk Files • Item: The only reason that feature code should be purged is if it is objectively or subjectively harmful • Exception: Crisis caused by unofficial evaluation • Problem: If one company detects some trivial files, other companies will follow suit in order to win higher marks in competitive evaluation. Is this worthwhile behavior? How can it be balanced with efficient and high-throughput virus detection? Antiy Labs www.antiy.net
  • 11. Challenge 5: Responsibility problem • Item: The clean up of a virus is the reverse of its infection • Case: Leftover backdoors leading to a worm returning • Question: Is AV software responsible for recovering all the system modifications made by the virus? And how to deal with leaks? Is this work endless? Antiy Labs www.antiy.net
  • 12. Challenge 6:The time of action • Item: Virus monitoring should prevent infected files from running and taking control of the system • Case: Arguments on file evaluation • Question: Since it is difficult to detect unknown PE viruses, Trojans or backdoors, should the heuristic report based on behavior be acted on immediately? Antiy Labs www.antiy.net
  • 13. Challenge 7:Active Protection • Item: User’s rights to the AV software • Case: scanning worms changed the image of victims • Question: At first, viruses aimed simply to infect users’ systems. Now, more often than not, they try to make infected systems further infect other systems. In such a case, can a virus be removed without the user’s permission? What means are acceptable? Is this a technological question or legal question? Antiy Labs www.antiy.net
  • 14. Putting forward and solving the problems • None of these problems are too difficult to be solved technologically • Some of them concern style and morals, however “Puzzling Criterion”, “Package Enigma”, and the “Responsibility Problem” are reactions to the traditional system and framework of the AV engine. • We need more adaptive and reasonable engine frameworks instead of expediency in programming Antiy Labs www.antiy.net
  • 16. The three elements of an AV Engine AV Engine Database Config Antiy Labs www.antiy.net
  • 17. The three elements of an AV Engine The three elements of an AV engine are the engine, database, and configuration. The engine relies on the database to detect, and the definitions in the configuration to work. Before, we put much emphasis on the engine. Now, we need to pay more attention to the configuration to see what gains it has to offer us. We also need to reevaluate the database – the maintenance of which is traditionally mechanical – to see whether the potential for creativity still exists. Antiy Labs www.antiy.net
  • 18. The Traditional Database Type 1 Type 2 Type 3 Type 4 Number √ √ √ √ Mod num √ √ √ √ Virus name √ √ √ √ First word of √ √ Feature code Offset1+Sign 1 √ √ Offset2+Sign 2 √ √ File type flag √ Process arg √ √ √ Processing √ √ module name Antiy Labs www.antiy.net
  • 19. The Traditional Database • In working with a database, 95% of viruses are detected via records of type 3 and type 4 (featuring code detection). Detecting the remaining 5% of special viruses is done with records of type 1 and type 2 (independent module detection). • Over 80% of viruses are processed via argument, and the remaining 20% via processing module。 Antiy Labs www.antiy.net
  • 20. Basic characteristics of the traditional Database • Object Control: what to detect • Behavior Control: how to process • Effectiveness Control: intensity of detection Antiy Labs www.antiy.net
  • 21. Traditional Configuration Means • Flow control (Program) • Debug Switch (Developer) • INI control (User) Antiy Labs www.antiy.net
  • 22. Object Control • Memory=Yes; check the memory • Sectors=Yes; check the boot sector • Files=Yes; check file system • Packed=Yes; check packages • Archives=Yes; check archives • MailBases=Yes; check emails • MailPlain=Yes; check encoded files • FileMask=2; check the extended names • UserMask= ?; user defined extension • Exclude=No; Don’t check customized extensions • ExcludeMask= ; Don’t check definition of extensions Antiy Labs www.antiy.net
  • 23. Behavior Control • InfectedAction=0; remove viruses • InfectedCopy=No; back up viruses • InfectedFolder=Infected; back up folders • SuspiciousCopy=No; back up suspicious files • SuspiciousFolder=Suspicious; back up folders • Report=Yes; generate logs • ReportFileName=Report.txt; name of log file Antiy Labs www.antiy.net
  • 24. Effectiveness Control • Warnings=Yes; Show warnings • CodeAnalyzer=Yes; Open the code analyzer • RedundantScan=Yes; Redundant scanning Antiy Labs www.antiy.net
  • 25. That’s enough? • In the traditional AV environment, this kind of granularity is enough for control, however problems occur when it comes to more complicated environments. Antiy Labs www.antiy.net
  • 26. Application Case 1 • Consider what different features the engine will have when working as AV software for a single computer VS working as one module in a mail server? • I-Worm.Nimda.e is a infective worm. When processed locally, it should be regarded as a PE infected file, but for a mail server, it should simply be discarded. • Win95.CIH is a infective virus. When detected, whether it is local or on mail server, it should be processed as an infected virus and the original file should be recovered. • The essential difference is that Win95.CIH doesn’t mail itself but rather is an executable program mailed by the user, while Nimda behaves contrarily. • This situation requires different processes for different kinds of viruses in various environments, it is beyond the capacity of traditional engine control. Antiy Labs www.antiy.net
  • 27. Application Case 2 • Network virus detection equipment contains several • Email detection responding modules • What policy should these • Duplicate email responding modules work detection with? • Feedback email • Some mail worms create addressees randomly, what detection will happen if sending • Reset connection creates a feedback loop? • Some mail worms use bots to create addressees. What will happen if the worm starts sending duplicates? Antiy Labs www.antiy.net
  • 28. Requirements from Engine User SMTP detection POP3 detection Faked True True Faked Faked True True False Recipient Recipient Sender Sender Recipient Recipient Sender Sender Feedback effective ineffective effective ineffective Detection Duplicate ineffective effective effective ineffective Detection Antiy Labs www.antiy.net
  • 29. Application Case 3 • Integration with • Different processing for networking equipment is scanning worms and mail an effective response. worms. • See: OPSEC, TOPSEC • It is simple to scan worm infection IP nodes. But if we do the same to email worms, they may send the same email over and over again causing DoS • We should check whether there is a proxy server on the network Antiy Labs www.antiy.net
  • 30. That’s not enough! • New demand goes beyond the capacity of the traditional engine • How can we solve this problem? Antiy Labs www.antiy.net
  • 31. Embeddable AV engine with high granularity
  • 32. Putting Forward the Question • The trending movement of network security products implies that virus filtering mechanisms will extend to equipment at different levels • The above discussion shows the need for the AV engine to adapt to more complicated environments • Embedded equipment or AV engines in other environments are designed for high granularity Antiy Labs www.antiy.net
  • 33. Application of Embedded Engine Application Form Details AV module in Firewall Construct linear speed virus filtering module for package filtering firewall with a network engine. Construct file stream virus filter for app proxies, transparent proxies or a stream filtering firewall with a file engine. AV module in router Add virus filtering ability to routing equipment with high speed package level scanning AV module in switch Add virus filtering ability to switching equipment with high speed packet scanning. Virus detecting plug-ins Extend the network engine to provide the IDS with network virus in IDS detection ability AV module in GAP Extend GAP equipment with virus filtering ability device Virus protection in mail Embed virus detection ability into mail servers system Independent AV software User need only to program against an API to develop their own AV software Antiy Labs www.antiy.net
  • 34. Basic Requirement 1: Memory Engine Object Report Peripheral I/O module Processing Memory Result Object AV Engine Antiy Labs www.antiy.net
  • 35. Memory Engine Interface Demo /*scanning parameter structure */ typedef struct _AVLF_SDK_SCAN_PARA { char * pBuffer; /* pointer to buffer */ unsigned long ulSize; /*size of the buffer */ const char * pDescription; /* description information */ int bUnpack; /* whether to unpack*/ int bKill; /* whether to kill the virus */ int bKilled; /* whether virus was killed successfully*/ } AVLF_SDK_SCAN_PARA,*PAVLF_SDK_SCAN_PARA; /* set the receiver */ AVLEACHSDK_API int AVLF_SDK_SetReciver(IReportReciver *pReciver); /*scanning:return 0 if no virus detected,return 1 if virus found,detailed information is received by the receiver class*/ AVLEACHSDK_API int AVLF_SDK_Scan(PAVLF_SDK_SCAN_PARA pParamter); Antiy Labs www.antiy.net
  • 36. Basic Requirement 2—— Recursive Engine • Modern AV engines have evolved from branched engines led by module-based format recognition to recursive engines • In a recursive engine, scanned objects could have multiple flags, which can be detected by corresponding modules • McAfee’s bug in detecting SFX • archbomb.zip Antiy Labs www.antiy.net
  • 37. Archbomb.zip DoS AVware Antiy Labs www.antiy.net
  • 38. How to detect archbomb.zip sign1 Offset: 4h Length: 7h Sign 2 Offset:300h Length:F0h A Zip which is also a binary stream could be detected by binary engine instead of what would be done in the traditional branched engine – being passed to archive extracting module by the Antiy Labs www.antiy.net format recognition module.
  • 39. Example—— Recursive Engine 1. Analyzers are parallel in structure, none are prerequisites. IConfig IComponent Factory 2. Results from the analyzers can provide different IEngine priority ratings, SDK AnalyseData with viruses listed Analyser1 as the highest and IComponent files needing Manager Analyser2 further processing Component as the lowest N AnalyserN 3. In principle, Component2 Component1 analyzers work serially, with higher priority results being Antiy Labs www.antiy.net forwarded.
  • 40. Basic Requirement 3—— portable engine • Working environment could be the x86 architecture, or other architectures like PPC • Modules written in x86 assembly language are a barrier to porting to other architectures. Antiy Labs www.antiy.net
  • 41. Basic Requirement 4—— Highly Controllable Engine • What are the essential requirements for high granularity? • Virus processing in different environments cannot only rely on detecting the infection feature but also the “specialty” of the virus. • The granularity of control needs to reach the individual virus, the database needs to provide more information. • Virus processing will be done with information from the database about the virus specialty. Antiy Labs www.antiy.net
  • 42. Control Level • Flow control (Program) • Debug Switch (Developer) • INI control (User) • Flow control (Program) • Virus attribute • Debug Switch (Developer) • Stencil (Condition) • INI control (User) Antiy Labs www.antiy.net
  • 43. Traditional Database V.S. High Granularity Database struct vxdb struct tgvxdb { { char name[255]; char name[255]; char fword[4]; char fword[4]; char offset1[4]; char offset1[4]; char crc1[8]; char crc1[8]; char offset2[4]; char offset2[4]; char crc2[8]; char crc2[8]; … … }; int vxattribute ; }; Antiy Labs www.antiy.net
  • 44. Basic Requirement 5—— Precise Processing Engine • Perfect reverse engineering is the end goal. • The High Granularity Engine ends the era in which the AV company does not need to analyze the virus. Antiy Labs www.antiy.net
  • 45. How to Process • Clean com tail • On the left is the cleaning • Clean com head parameter set which is • Clean exe tail widely accepted by many • Clean ne tail • Clean pe tail companies. • Remove file • We need the same • Copy data block detailed processing script • Move data block for non-infective viruses • Insert data block • Is this work endless? • Modify data block • Delete data block • Fill in data block • Truncate data tail • Truncate data head Antiy Labs www.antiy.net
  • 46. Our Model Antiy Labs www.antiy.net
  • 47. Our Understanding and Dream • AV principles are not invariable. Instead, they are evolving dynamic principles. They require not only summarizing but also supplementing and replacing. • We believe in our understanding and we persist in our dream. • Thank you! Antiy Labs www.antiy.net