T
Tweakie
Hi all,
Frederic Bonroy posted yesterday a brief summary of an anti-virus test
driven by Andreas Marx for a German magazine. Andreas tested heuristic
scanning through the use of two (and a half) different methods (he also
tested other parameters).
- The first method involved scanning recent viruses with 3 and 6 month
old signature databases* ;
- The second method used recent databases and viruses especically
created for the tests (a modified version of CIH, VBS and macro virus
generators and Optix Pro and Assassin 2.0 "generators").
- When applicable, the malwares were also packed with UPX, and both
packed and non packed versions were tested.
The first method is OK, it is probably one of the best techniques for
testing heuristics. In my opinion, the second one is very questionable.
Well, I don't know how CIH has been modified. Let's assume that it
has been done in such a way that every single byte of CIH have changed
(at execution time) so that none of the tested AV would recognize it
using signatures. Let's assume that the number of different VBS and
macro virus that can be generated by the generators is too large for
letting AV editors include each potential sample individually into
their databases. Let's also assume that these generators produce
code that does not contain any significant non variable part that
could be used as a signature.
Still, all these assumptions are *not* valid for the backdoor
"generators". These kind of generators, also called "build server"
utilities produce samples that do not vary much. They allow to
enable/disable some functionnalities of the backdoor, which does not
necessary mean that corresponding code is not present in the resulting
executable files. Moreover, there are large pieces of non-variable
code in it. I would say that this protocol rather tests the choice of
a signature than the heuristics. Coming from from av-test.org, this is
surprisingly amateurish.
There is therefore a legitimate doubt regarding my initial assumptions.
Frederic, do you have more information concerning the protocol ?
I know that some contributors of his group are quite familiar with
anti-virus testing. I would appreciate to know your opinion on this
particular topic.
Frederic Bonroy posted yesterday a brief summary of an anti-virus test
driven by Andreas Marx for a German magazine. Andreas tested heuristic
scanning through the use of two (and a half) different methods (he also
tested other parameters).
- The first method involved scanning recent viruses with 3 and 6 month
old signature databases* ;
- The second method used recent databases and viruses especically
created for the tests (a modified version of CIH, VBS and macro virus
generators and Optix Pro and Assassin 2.0 "generators").
- When applicable, the malwares were also packed with UPX, and both
packed and non packed versions were tested.
The first method is OK, it is probably one of the best techniques for
testing heuristics. In my opinion, the second one is very questionable.
Well, I don't know how CIH has been modified. Let's assume that it
has been done in such a way that every single byte of CIH have changed
(at execution time) so that none of the tested AV would recognize it
using signatures. Let's assume that the number of different VBS and
macro virus that can be generated by the generators is too large for
letting AV editors include each potential sample individually into
their databases. Let's also assume that these generators produce
code that does not contain any significant non variable part that
could be used as a signature.
Still, all these assumptions are *not* valid for the backdoor
"generators". These kind of generators, also called "build server"
utilities produce samples that do not vary much. They allow to
enable/disable some functionnalities of the backdoor, which does not
necessary mean that corresponding code is not present in the resulting
executable files. Moreover, there are large pieces of non-variable
code in it. I would say that this protocol rather tests the choice of
a signature than the heuristics. Coming from from av-test.org, this is
surprisingly amateurish.
There is therefore a legitimate doubt regarding my initial assumptions.
Frederic, do you have more information concerning the protocol ?
I know that some contributors of his group are quite familiar with
anti-virus testing. I would appreciate to know your opinion on this
particular topic.