Hitting the 'up to date' bulls eye

Steven Ginn OPSWAT

  download slides

Signature-based anti-malware products are only as strong as the definition files deployed with them. With each piece of new malware, a definition file's strength decays - opening up a security risk. This risk is typically addressed by staying 'up to date' - the notion of having the most recently released signature file possible. Users need to be able to identify when they aren't up to date and be able to get the latest definitions easily. There are several mechanisms in place to assist the user base with these tasks, including data file expiration, compliance 'up to date' checks, automatic updates, and various push and pull mechanisms. Unfortunately, as security vendors get more aggressive in their fight against malware (by releasing more frequent updates), these tools start to strain under the burden of maintaining 'up to date' status. As security vendors, we are facing challenges - one to keep up with the spread of malware, and the other to ensure our users have adequate means to keep up with us.

Using statistics collected about the patterns and trends of definition file updates provided by over 65 anti-virus and anti-spyware vendors since 2005, this paper will outline how the 'up to date' mark has become a moving target and some of the changes implemented to keep pace with that mark.



twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.