Who’s watching your network Deep Inside an AntiVirus Engine Network Associates, Inc. Jimmy Kuo Director, AV Research Deep Inside.

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Advertisements

Smita Thaker 1 Polymorphic & Metamorphic Viruses Presented By : Smita Thaker Dated : Nov 18, 2003.
File Systems.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
________________ CS3235, Nov 2002 Viruses Adapted from Pfleeger[Chap 5]. A virus is a program [fragment] that can pass on malicious code [usually itself]
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Computer Skills Preparatory Year Presented by: L.Obead Alhadreti.
Systems Software Operating Systems.
Anti Virus Techniques Jordan & Ryan Use of Checksum The Binary for key files is added up to a number especially in the boot files When these files are.
Client-Server collaborative scanning Dumitru Codreanu R&D, BitDefender.
Dr. Richard Ford  Szor 11  Virus Scanners – how they work, why they matter, how to write one…
MS Access Advanced Instructor: Vicki Weidler Assistant:
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Visual Basic: An Object Oriented Approach 12 – Creating and using ActiveX objects.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Computer Viruses Preetha Annamalai Niranjan Potnis.
Computers in the real world Objectives Understand what is meant by memory Difference between RAM and ROM Look at how memory affects the performance of.
AS Module 2 Information; Management and Management and Manipulation or what to do with data, how to do it, and……... ensure it provides useful information.
XP New Perspectives on Microsoft Office Access 2003 Tutorial 12 1 Microsoft Office Access 2003 Tutorial 12 – Managing and Securing a Database.
Lists in Python.
Unit 5- Computer Software.  Identify how hardware & software interact  Explain how a software program works  Describe the difference between application.
Software.
VIRUSES - Janhavi Naik. Overview Structure Classification Categories.
Structure Classifications &
Data and its manifestations. Storage and Retrieval techniques.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Everything you wanted to know about Computer Viruses.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Just as there are many human languages, there are many computer programming languages that can be used to develop software. Some are named after people,
Retrospective Testing - How Good Heuristics Really Work Andreas Marx AV-Test.org University of Magdeburg GEGA IT-Solutions GbR.
Systems Software Operating Systems. What is software? Software is the term that we use for all the programs and data that we use with a computer system.
For any query mail to or BITS Pilani Lecture # 1.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
© Janice Regan, CMPT 300, May CMPT 300 Introduction to Operating Systems Memory: Relocation.
Dealing with Malware By: Brandon Payne Image source: TechTips.com.
Capabilities of Software. Object Linking & Embedding (OLE) OLE allows information to be shared between different programs For example, a spreadsheet created.
Bordoloi Computer Virus Software programs written by someone that needs to get a lifeSoftware programs written by someone that needs to get a life Can.
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Information Technology Essentials Deloris Y. McBride.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
W elcome to our Presentation. Presentation Topic Virus.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
Computer virus Done: Aaesha Mohammed ID: H
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Systems Software. Systems software Applications software such as word processing, spreadsheet or graphics packages Operating systems software to control.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
ANTIVIRUS ANTIVIRUS Author: Somnath G. Kavalase Junior Software developer at PBWebvsion PVT.LTD.
Information Systems Design and Development Security Precautions Computing Science.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Computer Viruses Author: Alyse Allen.
Nature & Types of Software
Computing Fundamentals
computer virus infection & symptoms
Chap 10 Malicious Software.
Microsoft Office Access 2003
Chap 10 Malicious Software.
Presentation transcript:

Who’s watching your network Deep Inside an AntiVirus Engine Network Associates, Inc. Jimmy Kuo Director, AV Research Deep Inside an AntiVirus Engine Network Associates, Inc. Jimmy Kuo Director, AV Research Stanford, 16MAR99

Who’s watching your network Short description of viruses Environments Purposes of an antivirus engine Detection technologies Virus removal technologies Wrap-upAgendaAgenda

Who’s watching your network Viruses Replicate!

Who’s watching your network File Viruses Com, Exe (DLL, VxD), Bat, Sys, mIRC, Html Boot Viruses Boot Sector Master Boot Records Macro Viruses Word, Excel, PowerPoint, Access Multipartite Virus Types

Who’s watching your network Virus growth through the years: *Dr Solomon’s count of viruses and trojans

Who’s watching your network PC OLE2 files Compressed files Self-extracting files.BAT files, mIRC script, VB Script UNIX filesystems Environment Determination

Who’s watching your network FTP HTTP SNMP SMTP NNTP TCP/IP Mime, uuencode, SSL, PGPProtocolsProtocols

Who’s watching your network We deal with users with problems on their computer, problems they do not know how to handle. 1. Relieve the panic. 2. Understand the problem. 3. Resolve what the user understands to be the problem.PurposePurpose

Who’s watching your network 1. Detect all viruses. 2. The program is running on a clean machine. 3. Don’t give them a reason not to use your product. McAfee (NAI) Mantra

Who’s watching your network The Technology The Technology

Who’s watching your network Data organization –In memory –On disk Only things essential to detection are stored in memory. Names, repair information, virus information all stored on disk. Signature Search

Who’s watching your network All strings kept in memory. All strings of the same type. Method died out when viruses neared Signature Organization, Case 0

Who’s watching your network Split into virus types: Boot viruses, File viruses (Algorithmic detection, CRC detection), Macro viruses. Boot virus strings swapped to disk. Pull it in only if target file looks like a boot image. (55AA signature) CRCs used for those viruses that don’t change. Keep verification information on disk. Signature Organization, Case 1

Who’s watching your network All detection strings kept in memory. Sorted into separate bins. Only the particular bin that could contain the virus string is stored in low memory. All else stored in EMS or XMS. Virus removal information and names stored on disk. Signature Organization, Case 2

Who’s watching your network All detection strings stored in memory. Some are classed as “not necessary for the average user” and not used unless specifically requested. All verification information stored on disk (or EMS or XMS if available). Strings sorted into groups which have common start characteristics. Signature Organization, Case 3

Who’s watching your network Needs to be “front end fast.” If there’s a virus, it can take longer. But most things are not viruses, so it should be as quick as possible to determine that the target is not there. No time allowed for front end setup. So, quick and simple wins out. Signature Search Algorithms

Who’s watching your network Code Tracers Simplified emulation, but faster. Static emulation. Only have to know instruction length and flow transfer statements.

Who’s watching your network Code Tracing, Case 1 Given a target COM file, For specific cases of known flow transfers (jmp, call, push/ret, minor variations of such), Get to a fixed location, start searching for viruses here. Problem cases: polymorphic entry code

Who’s watching your network Code Tracing, Case 2 Given a target COM file, Trace code path through all available paths, until out of buffer. Remember opcodes. Use in opcode string matching. First time out of buffer, trace again. Remember opcodes again. Problem cases: Appending virus, appended to a small host.

Who’s watching your network Code Tracing, Case 3 Given a target COM file, Organize your virus database according to the different types of entry code. Search against only those viruses that use that type of entry code. This is the current technique we’re using.

Who’s watching your network Intel 80x86, primarily Now also needed. Portable. Apple emulation.EmulatorsEmulators

Who’s watching your network Prefetch queue length. How much of the environment do you include in the emulation? The “perfect” emulator takes too much time and memory. Result: Emulate situations required for known viruses. Needs upgrading to match reality. Emulator Problems

Who’s watching your network Matrix of opcode digraphs. Map the set of opcodes gathered from code trace onto the opcode digraphs of known viruses. If it does not match, it cannot be that virus. Add digraph matrices together to save memory space. Code Matrix

Who’s watching your network Loop detection. –Likely to need decrypting (emulate) Probability distribution (a particular virus uses Rotates much too often). Polymorphic viruses too difficult to handle otherwise. Special Case Code

Who’s watching your network An OLE2 file is a filesystem in a file. It’s a proprietary format belonging to Microsoft. Cracking the OLE2 format was easy. Next comes the Word document stream, the Excel spreadsheet stream, WordBasic, Visual Basic,... OLE2 Files (Macro Viruses)

Who’s watching your network Word6 macro encryption/protection is a single byte XOR. Key is available in document. Office97 macro protection is GUI only. Actual code is not encrypted at all. Excel95 password protection is almost trivial. Uses 16 byte XOR key with minor on-the-fly calculations. Other Macro Virus Issues

Who’s watching your network Office97 password protection against Open uses MD5. [Yuk!] PowerPoint97 streams stored as GZIP compressed data streams. WordBasic is tokenized language. VisualBasic is p-code. But there’s a separate compressed code body for “Edit.” Other Macro Virus Issues...

Who’s watching your network VisualBasic5 now supported across other applications! Soon, we’ll have to crack other file formats, not just OLE2. VisualBasic6 coming out in next few months. Things can up-convert, some can downconvert. Emulators for all these languages! Still More Macro Virus Issues

Who’s watching your network Must have “sufficient” variant determination. –Bytes to cut. –Where from. –Where to retrieve original information. –Where did the virus replace/take that original info from? Virus removal database does not need to stay in memory. Virus Removal

Who’s watching your network Variant determination. –Different sizes. –Different CRC values over different ranges. –String found at different position. –The specific variant does something unique. Need to know this for user information. Varient Determination

Who’s watching your network Virus Payloads affect: –Registry –Added instructions in files. (AUTOEXEC.BAT) –Additional files dropped. –Things added to WIN.INI. –“Bad sector” repair. –Anything software can do. Side Effect Removal

Who’s watching your network Speed Issues Memory management. Memory, hard disk, floppy. 640K memory, XMS, EMS, 32-bit memory, memory swapping. Clean machine.

Who’s watching your network Final Thought Compare what was covered in this presentation against an access control package. Project: The following files are allowed to be executed by this set of people. AND NOTHING ELSE!

Who’s watching your network Questions & Answers

Your Partner Against the Virus Problem Your Partner Against the Virus Problem