Execution Context in Anti-Malware Testing

This paper explains why comparative test results based on static testing may seriously underestimate and misrepresent the detection capability of some products using proactive, behavioural techniques such as active heuristics and emulation.
First published in EICAR 2009 Conference Proceedings.

Understanding and Teaching Bots and Botnets

Second in a series illustrating innovative ways of teaching the concepts behind a major security issue, the paper illustrates how botmasters capture computers and “recruit” them into virtual networks to use them for criminal purposes.
First published in Virus Bulletin 2008 Conference Proceedings.*

People Patching: Is User Education Of Any Use At All?

Presents the arguments for and against education as an antimalware tool, and how to add end users as an extra layer of protection in a defense-in-depth strategy.
AVAR Conference 2008

Who Will Test The Testers?

Making anti-malware testers and certifying authorities pdf accountable for the quality of their testing methods and the accuracy of the conclusions they draw, based on that testing.
First published in 2008 Virus Bulletin Conference Proceedings.*

A Dose By Any Other Name

Tries to answer questions like; why is there so much confusion about naming malware? Is ‘Do you detect virus X?’ the wrong question in today’s threat landscape?
First published in Virus Bulletin 2008 Conference Proceedings.*

Understanding and Teaching Heuristics

Understanding and teaching the basic concepts behind heuristic analysis and how it is used in the anti-malware industry.
AVAR Conference 2007

Teach Your Children Well – ICT Security and the Younger Generation

Research based on surveys in Belgium and the UK on teenage understanding of internet security issues.
First published in 2005 Virus Bulletin Conference Proceedings.*

Testing, testing: Anti-Malware Evaluation for the Enterprise

Looks at appropriate and inappropriate ways of testing anti-malware products.
AVAR Conference 2007

Phish Phodder: Is User Education Helping or Hindering

Evaluates research on susceptibility to phishing attacks, and looks at web-based educational resources such as phishing quizzes. Do phished institutions and security vendors promote a culture of dependence that discourages computer users from helping themselves?
First published in 2007 Virus Bulletin Conference Proceedings.*

From Fun to Profit

Presents an overview of the evolution of malicious software, focusing on the objectives of this type of program to provide evidence for their predictions as to how it will evolve in the years to come.
Infosec Paris 2007

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar


Select month
Copyright © 2013 ESET, All Rights Reserved.