Antivirus products nowadays almost always come bundled with some forms of proactive detection based on application behaviours. Many antivirus products in the market claim that they can detect and stop new and unknown threats with minimum use of traditional byte matching signatures. However, behavioural based detection is not the ultimate solution and can be circumvented. A few companies carry out independent tests to rate the capabilities of the antivirus to stop new and unknown threats.
However, these tests are not frequently updated and therefore cannot reflect the real daily situation as new threats are constantly being released into the wild.
In this project, we study the behavioural detection engines of the antivirus in both the 32-bit and 64-bit versions of Windows 7 by using specialised modules to identify the technologies that the antivirus are using to monitor application behaviours.
Our analysis revealed that the 64-bit versions of the antivirus are generally weaker than their 32-bit versions. To determine the effectiveness of the antivirus behavioural detection engines, we propose replaying the actions of applications from sandbox logs to the antivirus and observing the reaction of the antivirus.
Our experiments demonstrated that this approach can illustrate the capabilities of the antivirus behavioural detection engines and uncover the behavioural detection signatures of the antivirus at the same time.
File Type: PDF
File Size: 1.51 MB
Total Pages: 90
Direct Link Mega:
Download Now
Direct Link AnonFiles:
Download Now
Direct Link Mediafire:
Download Now
Direct Link Solidfiles:
Download Now
Direct Link Sabercathost:
Download Now
Direct Link Tusfiles:
Download Now

Comments
Post a Comment