白皮書

Share |
Malware and antivirus software

下載白皮書

ESET 會議文章

Real Performance?

By Jan Vrabec and David Harley
This paper objectively evaluates the most common performance testing models (as opposed to detection testing) used in anti-malware testing, highlighting potential pitfalls and presenting recommendations on how to test objectively and how to spot a potential bias.
First presented at EICAR 2010 and published in the Conference Proceedings.

Perception, Security, and Worms in the Apple

By David Harley, Pierre-Marc Bureau and Andrew Lee
Apple's customer-base has rejoined the rest of the user community on the firing line. This paper will compare the view from Apple and the community as a whole with the view from the anti-virus labs of the actual threat landscape.
First presented at EICAR 2010 and published in the Conference Proceedings.

Macs and Macros: the State of the Macintosh Nation

By David Harley
This 1997 paper reviews the shared history of viruses and the Mac, summarizes the 1997 threatscape, and considers possibilities and strategies for the future. It's been made available for historical interest because so many people asked about it at EICAR 2010.
First published in Virus Bulletin 1997 Conference Proceedings.*

Please Police Me

By Craig Johnston and David Harley
This paper looks at the ethical, political and practical issues around the use of "policeware", when law enforcement and other legitimate agencies use "cybersurveillance" techniques based on software that resembles some forms of malware in its modus operandi.
First presented at AVAR 2009 in Kyoto, and published in the Conference Proceedings.*

Malware, Marketing and Education: Soundbites or Sound Practice?

By David Harley and Randy Abrams
This paper considers the practical, strategic and ethical issues that arise when the security industry augments its marketing role by taking civic responsibility for the education of the community as a whole.
First presented at AVAR 2009 in Kyoto, and published in the Conference Proceedings.*

Malice Through the Looking Glass: Behaviour Analysis for the Next Decade

By Jeff Debrosse and David Harley
This paper considers steps towards a holistic approach to behaviour analysis, using both social and computer science to examine the behaviours by both criminals and victims that underpin malware dissemination.
First published in Virus Bulletin 2009 Conference Proceedings.*

Whatever Happened to the Unlikely Lads? A Hoaxing Metamorphosis

By David Harley and Randy Abrams
This paper traces the evolution of email-borne chain letters, from crude virus hoaxes to guilt-tripping semi-hoaxes, and examines both their (generally underestimated) impact on enterprises and individuals, and possible mitigations.
First published in Virus Bulletin 2009 Conference Proceedings.*

Is there a lawyer in the lab?

By Juraj Malcho
This paper by the Head of ESET's Virus Laboratory explores the complex legal problems generated by applications that can't be called out-and-out malware, but are nevertheless potentially unsafe or unwanted.
First published in Virus Bulletin 2009 Conference Proceedings.*

The Game of the Name: Malware Naming, Shape Shifters and Sympathetic Magic

By David Harley
This paper follows up on "A Dose By Any Other Name", explaining why sample glut and proactive detection have sounded the death knell of the "one detection per variant" model.
Presented at the 3rd Cybercrime Forensics Education & Training (CFET 2009) Conference in September 2009.

Execution Context in Anti-Malware Testing

By David Harley
This paper explains why comparative test results based on static testing may seriously underestimate and misrepresent the detection capability of some products using proactive, behavioural techniques such as active heuristics and emulation.
First published in EICAR 2009 Conference Proceedings.

Understanding and Teaching Bots and Botnets

By Randy Abrams
Second in a series illustrating innovative ways of teaching the concepts behind a major security issue, the paper illustrates how botmasters capture computers and "recruit" them into virtual networks to use them for criminal purposes.
First published in Virus Bulletin 2008 Conference Proceedings.*

People Patching: Is User Education Of Any Use At All?

By Randy Abrams and David Harley
Presents the arguments for and against education as an antimalware tool, and how to add end users as an extra layer of protection in a defense-in-depth strategy.
AVAR Conference 2008

Who Will Test The Testers?

By David Harley and Andrew Lee
Making anti-malware testers and certifying authorities more accountable for the quality of their testing methods and the accuracy of the conclusions they draw, based on that testing.
First published in 2008 Virus Bulletin Conference Proceedings.*

A Dose By Any Other Name

By David Harley and Pierre-Marc Bureau
Tries to answer questions like; why is there so much confusion about naming malware? Is 'Do you detect virus X?' the wrong question in today's threat landscape?
First published in Virus Bulletin 2008 Conference Proceedings.*

Understanding and Teaching Heuristics

By Randy Abrams
Understanding and teaching the basic concepts behind heuristic analysis and how it is used in the anti-malware industry.
AVAR Conference 2007

Teach Your Children Well - ICT Security and the Younger Generation

By David Harley with Eddy Willems, and Judith Harley
Research based on surveys in Belgium and the UK on teenage understanding of internet security issues.
First published in 2005 Virus Bulletin Conference Proceedings.*

Testing, testing: Anti-Malware Evaluation for the Enterprise

By David Harley and Andrew Lee
Looks at appropriate and inappropriate ways of testing anti-malware products.
AVAR Conference 2007

Phish Phodder: Is User Education Helping or Hindering

By David Harley and Andrew Lee
Evaluates research on susceptibility to phishing attacks, and looks at web-based educational resources such as phishing quizzes. Do phished institutions and security vendors promote a culture of dependence that discourages computer users from helping themselves?
First published in 2007 Virus Bulletin Conference Proceedings.*

From Fun to Profit

By Andrew Lee and Pierre-Marc Bureau
Presents an overview of the evolution of malicious software, focusing on the objectives of this type of program to provide evidence for their predictions as to how it will evolve in the years to come.
Infosec Paris 2007

Microsoft anti-virus — extortion, expedience or the extinction of the AV industry?

By Randy Abrams
Looks at the changes in the corporate culture at Microsoft and the company's re-entry into the anti-malware market. Will it reduce diversity of choice, and will it leave users in any better shape than MSAV did in the 1990s?
First published in Virus Bulletin Conference 2006 proceedings.*

ESET 的調查報告

ESET 白皮書

其他白皮書

ESET 簡報

獨立測試

反惡意軟件測試與評估

其他資源

為何選擇ESET?

ESET擁有超過25年以上防病毒軟件開發經驗,讓我們更安全享受科技。ESET軟件對硬件要求低,對惡意軟件毫不留情。

ESET技術

ESET NOD32®防毒軟件獲獎技術,始終位於數字安全行業的最前沿。軟件每日更新,保護用戶數據安全。

免費支援

為您免費提供業內領先的本地售後技術支援。如有任何問題或查詢請在辦公時間內致電 (852) 2893 8186 查詢。