home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!europa.asd.contel.com!darwin.sura.net!spool.mu.edu!caen!uakari.primate.wisc.edu!ames!pacbell.com!iggy.GW.Vitalink.COM!cs.widener.edu!netnews.upenn.edu!netnews.cc.lehigh.edu!news
- From: bontchev@fbihh.informatik.uni-hamburg.de (Vesselin Bontchev)
- Newsgroups: comp.virus
- Subject: Re: Auto-detecting Virus (PC)
- Message-ID: <0017.9209111901.AA28207@barnabas.cert.org>
- Date: 11 Sep 92 08:42:52 GMT
- Sender: virus-l@lehigh.edu
- Lines: 47
- Approved: news@netnews.cc.lehigh.edu
-
- Alexander_Ofek@p8.f101.n9721.z9.virnet.bad.se (Alexander Ofek) writes:
-
- > Your approach will fail to detect a stealth virus like 1963 or dir2.
- > To be on the safe side you will have to read the directory using absolute rea
- d
- > (int 13h) and follow the FAT chains yourself.
-
- Which will fail to detect advance stealth viruses like Int13, which
- are stealthy at sector access level. Using INT 13h to read the file
- will not detect Dir_II either, since this virus subverts the block
- device driver requests...
-
- > Of course it might be useful to
- > check whether the interrupt vectot of int 13h still points to the BIOS area.
-
- Unfortunately, since DOS 3.20 the interrupt vector for INT 13h never
- points to the BIOS area (except at boot time), since DOS intercepts it
- itself...
-
- There are other possible anti-stealth techniques that could be used,
- like scanning the ROM space for the hard disk controller program and
- calling it directly, but neither of these tricks is reliable and/or
- compatible with all kinds of systems... Just as an example, consider a
- disk, compressed with Stacker... How are you going to access the files
- on it "at a low level"?
-
- The -only- secure technique against the stealth viruses is to use the
- "magic object" - to cold boot from a write-protected non-infected
- system diskette. Unfortunately, this method of operation is considered
- too inconvenient by most users. Furthermore, it can be used only for
- off-line integrity checkers, and what the original poster proposed was
- an integrity module, contained in the executable file. In this case,
- there's no way to stop the stealth viruses from fooling the integrity
- module.
-
- > Use any CRC check with an UNUSUAL (i.e. rarely used) polinomial.
-
- More exactly, use a CRC with a -different- polynomial on each
- particular installation (be it a computer or a program).
-
- Regards,
- Vesselin
- - --
- Vesselin Vladimirov Bontchev Virus Test Center, University of Hamburg
- Tel.:+49-40-54715-224, Fax: +49-40-54715-226 Fachbereich Informatik - AGN
- ** PGP public key available on request. ** Vogt-Koelln-Strasse 30, rm. 107 C
- e-mail: bontchev@fbihh.informatik.uni-hamburg.de D-2000 Hamburg 54, Germany
-