Features of Virus Detection Mechanism in Microsoft Security Essentials (Microsoft Forefront Endpoint Protection)

DOI: 10.4236/jis.2013.42014   PDF   HTML   XML   4,442 Downloads   7,463 Views  

Abstract

In this paper, a signature-based selective mechanism in detecting virus signatures in executable files was found and investigated. A pattern under which the Microsoft Security Essentials antivirus software not detecting a virus signature deliberately placed in files was revealed.

Share and Cite:

D. Silnov, "Features of Virus Detection Mechanism in Microsoft Security Essentials (Microsoft Forefront Endpoint Protection)," Journal of Information Security, Vol. 4 No. 2, 2013, pp. 124-127. doi: 10.4236/jis.2013.42014.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] D. S. Silnov, “Problems of Antivirus False Positives,” Applied Informatics, 2012, pp. 63-66.
[2] Microsoft Security Essentials—Free Antivirus Software. http://windows.microsoft. com/ru-RU/win dows/products/security- essentials
[3] Microsoft Forefront Endpoint Protection, Antivirus Protection against Malware. http://www.microsoft. com/ru-ru/server-cloud/fore front/ endpoint-protection.aspx
[4] Introduction to Code Signing. http://msdn.microso ft.com/en-us/library/ms5373 61%28v=vs. 85%29.aspx
[5] WinHEX. http://www.winhex.com/winhex/
[6] Fake Anti-Virus Software and Related Threats, Microsoft Security Center. http://www.microsoft. com/ru-ru/security/pc-security/ antivirus-rogue.aspx
[7] Bitdefender Antivirus Software. http://www.bitdefender.ru/
[8] The Stuxnet Sting. http://blogs.technet.com/b/mmpc/archive/2010/07/16/the-stuxnet-sting.aspx

  
comments powered by Disqus

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.