Vulnerability dependencies in antivirus software

Kreetta Askola, Rauli Puuperä, Pekka Pietikäinen, Juhani Eronen, Marko Laakso, Kimmo Halunen, Juha Röning

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

3 Citations (Scopus)

Abstract

In this paper we present an application of the MATINE method for investigating dependencies in antivirus (AV) software and some vulnerabilities arising from these dependencies. Previously, this method has been effectively used to find vulnerabilities in network protocols. Because AV software is as vulnerable as any other software and has a great security impact, we decided to use this method to find vulnerabilities in AV software. These findings may have implications to critical infrastructure, for the use of AV is often considered obligatory. The results were obtained by gathering semantic data on AV vulnerabilities, analyisis of the data and content analysis of media follow-up. The results indicate, that different aspects of AV software should be observed in the context of critical infrastructure planning and management.

Original languageEnglish
Title of host publicationProceedings - 2nd Int. Conf. on Emerging Security Information, Sys. Technol., SECURWARE 2008, Includes DEPEND 2008
Subtitle of host publication1st Int. Workshop on Dependability and Security in Complex and Critical Inf. Sys.
Pages273-278
Number of pages6
DOIs
Publication statusPublished - 17 Nov 2008
MoE publication typeA4 Article in a conference publication
Event2nd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008 - Cap Esterel, France
Duration: 25 Aug 200831 Aug 2008

Conference

Conference2nd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008
Country/TerritoryFrance
CityCap Esterel
Period25/08/0831/08/08

Keywords

  • Antivirus vulnerabilities
  • Dependency tracking
  • Vulnerability dependencies

Fingerprint

Dive into the research topics of 'Vulnerability dependencies in antivirus software'. Together they form a unique fingerprint.

Cite this