2022
DOI: 10.1016/j.cose.2021.102500
|View full text |Cite
|
Sign up to set email alerts
|

AntiViruses under the microscope: A hands-on perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…To avoid committing pitfalls, I conducted an analysis of real AV's operations to develop the foundations for future developments. The findings were published in a paper [Botacin et al 2021c] and the results published on it highlight: (i) the performance overhead imposed by monitoring solutions, which motivates the research about more efficient AVs; and (ii) the still significant use of signatures by AV solutions, which motivates my choice for their use in some of the published papers, as following presented.…”
Section: Real Av Operationmentioning
confidence: 94%
“…To avoid committing pitfalls, I conducted an analysis of real AV's operations to develop the foundations for future developments. The findings were published in a paper [Botacin et al 2021c] and the results published on it highlight: (i) the performance overhead imposed by monitoring solutions, which motivates the research about more efficient AVs; and (ii) the still significant use of signatures by AV solutions, which motivates my choice for their use in some of the published papers, as following presented.…”
Section: Real Av Operationmentioning
confidence: 94%
“…We selected five popular AV products for our detectability analysis: Windows Defender, Avast, AVG, Kaspersky, and Avira. These products qualify as modern EDR solutions and cover state-of-the-art detection techniques [5]. For instance, they monitor system calls using user-space and kernel-space hooks; they use both signature-based and real-time behavioral detection; and they implement self-and system-protection techniques.…”
Section: Methodsmentioning
confidence: 99%
“…The choice of antivirus solutions can be a limitation of our evaluation. We focused on antivirus solutions that represent those commonly used in real-world scenarios [5], considering the ones that aligned better with the typical deployment context of adversary emulation.…”
Section: Threats To Validitymentioning
confidence: 99%
“…As suggested by Botacin et al ( Botacin et al, 2021 ), it is appropriate that the design phase of a security solution consists of reasoning about its design aspects, such as the definition of a threat model, assumptions, target platform, and so on. A threat model specifies which, why and how resources will be protected ( Botacin et al, 2022 ). The ultimate goal of our research work is to design an ontology and then produce a knowledge base for digital extortion-based onslaughts.…”
Section: Design Of Digital Extortion Ontologymentioning
confidence: 99%
“…These systems operate by running malware instances in controlled environments and capturing their behavioral patterns. Current antiviruses utilize various detection methods and operate based on multiple engines that are activated according to the type of scan and the requested context ( Botacin et al, 2022 ). A comprehensive longitudinal analysis of these security solutions is presented in ( Botacin et al, 2020 ), which evaluates them based on six metrics proposed by the authors from different aspects.…”
Section: Introductionmentioning
confidence: 99%