This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.
Reason #2: the Desktop Security Software Risks
The risks of placing software on the desktop are such that I will be breaking this article into two parts.
Fundamentally we think of having software on our desktops as a good thing. I love downloading or installing new packages and seeing what new creative things people do to the user interface or what they do to make certain aspects of my life easier or more fun.
But there are problems inherent with software that resides on the desktop, especially security software. All developers will know what I mean. First and foremost, desktop software can be reverse engineered. What's that mean? Have you ever inadvertently double-clicked on a file and had garbage show up or seen something that looks similar to this?
http://www.checkinmyemail.com/Articles/image001.jpg
The old hex dump. Programmers will know it well. We actually spend a good deal of time trying to read this stuff. Basically, if there are programs that can (and do) turn instructions like the following
If UserBirthDate < "01/01/1960" then
IsReallyOld = "Yes
Else
IsReallyOld = "No"
End If
into something like the picture above, then the reverse is true: people have developed software that can take that gobbeldy-gook in the picture above and turn it somewhat into the if-statement I wrote out. The reversing software won't know that I had an item called UserBirthDate, but it will know I was testing for a value of January 1, 1960 and it will be able to say that based on that value I set another item to Yes or No.
So now we install our fool-proof anti-virus software on our desktop (or our firewall for that matter). Well, so too can a virus author. And that virus author or hacker will also have gotten a copy of the latest reverse-engineering software from his local hacking site. He now goes upon his task of reverse-engineering the software and then trying to decipher the results. It's not easy but it can be done. Unfortunately, vendors know this and understand this as an acceptable risk.
The problem here is that your security software is at risk. If your vendor codes an error, the virus author can and will detect it. For example, if your vendor should exclude a file from scanning, it's possible the virus author will figure out which file (or type of file) that is and bury his code there. If the vendor excludes files from scanning or heuristics, it's possible that virus author will figure out a way to corrupt that file.
That being said, there are other risks. As we have said, once software is on the desktop it affords virus authors an opportunity to reverse-engineer security software. The knowledge that reverse-engineering provides is invaluable to a virus author when building his next software attack. Third, virus authors can learn where the anti-virus vendors put there software and put the links to their software (directory folders, registry entries, etc.). This too is invaluable information. In fact, in some ways it teaches people intent on writing malicious software clues as to how to infiltrate the computers' operating system, where registry entries need to be made to force software to be loaded every time a computer is started, etc.
This information is generally available all over the web and in manuals for operating systems, especially manuals on such subjects as the Windows Registry. But having the software teach you where things belong to be effective is powerful knowledge.
Lastly, and perhaps most significantly, is the issue of forebearance. The anti-virus vendors usually know more about the potential exploits inherent in programs than virus authors but they are bound by the fact that should they try to prevent them before the exploits occur, they could be branded as irresponsible for teaching virus authors about these very exploits.
For example, when Microsoft first released the macro capabilities of Word, anti-virus vendors immediately realized the potential for danger in macros, but they were handcuffed. If they released software that disabled macros before the first macro virus was ever released, they would signal to virus authors the inherent destructive powers of macros. They chose instead to wait, handcuffed by the limitations of desktop software.
Until the Internet there really has been no better medium for delivering virus solutions than desktop software. It was relatively inexpensive to deploy (either market the software and sell it in stores or provide free downloads on bulletin boards and web sites). It is, however, expensive to keep updated in terms of time and effort, even with automated update systems.
The Internet caused several things to happen: by becoming a powerful medium for sharing files, whole families of viruses disappeared practically overnight (boot sector viruses, for example); by becoming the option of choice for sharing files, it was easier to infect a single file and have thousands download it.
A better solution is to place the security software in an offsite appliance of its own making. All Internet, intranet, networking connections flow through the appliance.
Selling off the shelf hardware appliances with built-in security software is better than a desktop software solution but it still suffers ?to a lesser extent- from the pratfalls that desktop software falls prey to.
Even better is to create a service that a 3rd party vendor manages in a secure environment. In such an instance both the software and the hardware are away from the prying eyes of the malicious software authors. This further reduces the opportunity for malicious authors to discover the tricks and techniques employed by the security vendors to protect you.
About The Author
Tim Klemmer
CEO, OnceRed LLC
http://www.checkinmyemail.com
Tim Klemmer has spent the better part of 12 years designing and perfecting the first true patented behavior-based solution to malicious software.
![]() |
|
![]() |
|
![]() |
|
![]() |
From the "Ask Booster" column in the June 17, 2005... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
So called phishers try to catch the information about the... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
You can detect spyware online using free spyware cleaners and... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
Well, if that would have been said to me by... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
First I would like to stress I am condoning the... Read More
A couple of days ago, I was searching for a... Read More
Spyware is software or hardware installed on a computer without... Read More
This is the second in a series of articles highlighting... Read More
Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More
A friend called me one day and asked if I... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
We all get the odd virus now and then, but... Read More
Business on the internet is getting down right shameless. This... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
Well, this is an article I never thought I would... Read More
The money being spent online is steadily growing. With billions... Read More
P C. owners are constantly at risk from attacks by... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
Millions of people make purchases online, but many people are... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
Before you enter your name, address or any other data... Read More
While clicking from site to site on the internet you... Read More
Can you protect your computer from all possible viruses and... Read More
Despite the current wave of identity theft and corporate security... Read More
With the Internet entering our lives in such an explosive... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
Every now and then you can read about a new... Read More
The Threat10 years ago you could probably have run no... Read More
When we think of adware, what comes to mind are... Read More
It's late. You've been scouring the web for that perfect... Read More
We all get the odd virus now and then, but... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
Ebay is a great site and is used by many... Read More
Do you sometimes notice your computer running slower. Is your... Read More
Pharming is one of the latest online scams and rapidly... Read More
Have been an Internet user for more than 9 years,... Read More
If you constantly deal with bank or electronic accounts, it... Read More
Well, if that would have been said to me by... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
When surfing the Internet you probably take your anonymity for... Read More
Spyware and adware are becoming major problems for online surfers... Read More
You may not realize it, but as you are surfing... Read More
If you use emails actively in your communication, you must... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
The first thing people think about when defending their computers... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
They're out there. Individuals trying to make a quick buck... Read More
As soon as almost all computer users already got used... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
At this point, if you've got the whole "turning the... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
There is no doubt that "how-to articles" have become a... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
Paypal is a great site and is used by many... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
Internet Security |