How to Assess the Effectiveness of your Anti-virus?

作者: Sébastien Josse

DOI: 10.1007/S11416-006-0016-Y

关键词:

摘要: I will present an approach whose purpose aims at supporting and making easier more relevant the choice of anti-virus product. Among qualities, which one can expect from product, appear classically optimal use resources reactivity manufacturer, particularly concerning viral signature base update. If these requirements are significant, other methodical technical verifications may be required in order for individual or a company to make their choice. In Common Criteria evaluation scheme, protection profile is proposed help software manufacturer design product that should evaluated by independent security laboratory. Protection profiles written accordance with standard. Starting profile, we list some tests could carried out validate Both specification seem valuable basis measure confidence grant

参考文章(16)
A.H. Sung, J. Xu, P. Chavez, S. Mukkamala, Static analyzer of vicious executables (SAVE) annual computer security applications conference. pp. 326- 334 ,(2004) , 10.1109/CSAC.2004.37
Ulrich Bayer, Christopher Kruegel, Engin Kirda, TTAnalyze: A Tool for Analyzing Malware Proceedings of the European Institute for Computer Antivirus Research Annual Conference,2006. ,(2006)
Oleg Kolesnikov, Wenke Lee, Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic Georgia Institute of Technology. ,(2005)
Fabrice Bellard, QEMU, a fast and portable dynamic translator usenix annual technical conference. pp. 41- 41 ,(2005)
Galen Hunt, Doug Brubacher, Detours: binary interception of Win32 functions conference on usenix windows nt symposium. pp. 14- 14 ,(1999)
Mihai Christodorescu, Somesh Jha, Static analysis of executables to detect malicious patterns usenix security symposium. pp. 12- 12 ,(2003) , 10.21236/ADA449067
Erez Zadok, Charles P. Wright, Yevgeniy Miretskiy, Abhijith Das, Avfs: an on-access anti-virus file system usenix security symposium. pp. 6- 6 ,(2004)
Fred Cohen, Computer viruses Computers & Security. ,vol. 6, pp. 22- 35 ,(1987) , 10.1016/0167-4048(87)90122-2
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandowski, Robert K. Cunningham, Detection of injected, dynamically generated, and obfuscated malicious code workshop on rapid malcode. pp. 76- 82 ,(2003) , 10.1145/948187.948201
Eric Filiol, Malware Pattern Scanning Schemes Secure Against Black-box Analysis Journal in Computer Virology. ,vol. 2, pp. 35- 50 ,(2006) , 10.1007/S11416-006-0009-X