AntiViruses under the microscope: A hands-on perspective

被引:15
作者
Botacin, Marcus [1 ]
Domingues, Felipe Duarte [2 ]
Ceschin, Fabricio [1 ]
Machnicki, Raphael [1 ]
Zanata Alves, Marco Antonio [1 ]
de Geus, Paulo Licio [2 ]
Gregio, Andre [1 ]
机构
[1] Fed Univ Parana UFPR BR, Curitiba, Parana, Brazil
[2] Univ Campinas UNICAMP BR, Campinas, SP, Brazil
关键词
PERFORMANCE CHARACTERIZATION; VIRUS; GENERATION;
D O I
10.1016/j.cose.2021.102500
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
AntiViruses (AVs) are the main defense line against attacks for most users and much research has been done about them, especially proposing new detection procedures that work in academic prototypes. However, as most current and commercial AVs are closed-source solutions, in practice, little is known about their real internals: information such as what is a typical AV database size, the detection methods effectively used in each operation mode, and how often on average the AVs are updated are still unknown. This prevents research work from meeting the industrial practices more thoroughly. To fill this gap, in this work, we systematize the knowledge about AVs. To do so, we first surveyed the literature and identified existing knowledge gaps in AV internals' working. Further, we bridged these gaps by analyzing popular (Windows, Linux, and Android) AV solutions to check their operations in practice. Our methodology encompassed multiple techniques, from tracing to fuzzing. We detail current AV's architecture, including their multiple components, such as browser extensions and injected libraries, regarding their implementation, monitoring features, and self-protection capabilities. We discovered, for instance, a great disparity in the set of API functions hooked by the distinct AV's libraries, which might have a significant impact in the viability of academically-proposed detection models (e.g., machine learning-based ones). (C) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:68
相关论文
共 196 条
[1]  
Abrams R., 2004, SCRIPTING AV SIGNATU
[2]  
Aghakhani H., 2020, 27 ANN NETW DISTR, DOI DOI 10.14722/ndss.2020.24310
[3]   Review of Signature-based Techniques in Antivirus Products [J].
Al-Asli, Mohammed ;
Ghaleb, Taher Ahmed .
2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, :422-427
[4]  
Al-Saleh M.I., 2018, P 2018 1 INT C INT E, P158
[5]  
Al-Saleh MI, 2019, J UNIVERS COMPUT SCI, V25, P1089
[6]   Antivirus performance characterisation: system-wide view [J].
Al-Saleh, Mohammed Ibrahim ;
Espinoza, Antonio M. ;
Crandall, Jedediah R. .
IET INFORMATION SECURITY, 2013, 7 (02) :126-133
[7]  
alreid, 2016, PEID
[8]  
Alvarez S., 2007, AntiVirus (In)Security
[9]  
Amit Y., 2016, Accessibility Clickjacking" - The Next Evolution in Android Malware that Impacts More Than 500 Million Devices
[10]   An empirical study of DLL injection bugs in the Firefox ecosystem [J].
An, Le ;
Castelluccio, Marco ;
Khomh, Foutse .
EMPIRICAL SOFTWARE ENGINEERING, 2019, 24 (04) :1799-1822