We Are Just Describing How Internal Algorithm Should Be For Any Firmware or Software Anti-Malicious Product?

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

We are just describing how internal

algorithm should be for any firmware or


software Anti-Malicious product?
Scan Engine
Mnemonic is CALL then
lock the last one or two WORDS depending upon whether
call was near or far.
Mnemonic is IN/OUT instruction then
Check operands detect PORT address.
Look in the INTERNAL_MEMORY if process is allowed to access
that port or not.

If JUMP code is there


Fetch next if it is NOP fetch again.
If Memory address, check for that procedure.

Apply Compiler type algorithm for any JUMP instruction that whether it
will end or not.
If MOV SEG_REG, X is there
Than make sure X is not in the sheltered memory
space.
For replicated malware
Use Check Sum technique.

this is how Scan Engine of Anti-Malicious works in its running mode when it
deals with Assembly.

Verifier Engine
Verifier mode works based on Attack Database of anti-virus product.
There are two types of mode
1. For each file F check every signature S
2. For every signature S check all files F.
Both have its advantages & disadvantages

You might also like