home *** CD-ROM | disk | FTP | other *** search
- From: Otto.Stolz.RZOTTO@DKNKURZ1
- Newsgroups: comp.virus
- Subject: Re: Polymorphic viruses
-
- In my copy of VIRUS-L, roughly three paragraphs of my proposed FAQ entry
- are missing. I fear that other VIRUS-L subscribers may have received
- garbeled copies, as welle; hence, I re-submit said entry:
-
- [Moderator's note: The moderator apologizes for inadvertantly wiping
- out the three paragraphs. The FAQ entry in my file is complete.]
-
- Q: What is special about polymorphic viruses? Why are they called
- "polymorphic"?
-
- A: In order to eradicate a virus infection, all instances of this
- particular virus in various places (program files, boot records, etc.)
- have to be found and identified. A program to acomplish this task is
- called a Virus Scanner.
-
- A polymorphic virus tries to escape virus scanners by producing varied
- (yet fully operational) copies of itself.
-
- One method to evade signature-driven virus scanners is self-encryption
- with a variable key; however these viruses (e.g. Cascade) are not
- termed "polymorphic", as their decryption code is always the same and
- hence can be used as a virus signature even by the simplest, signature
- driven virus scanners.
-
- One method for a polymorphic virus is choosing amongst a variety of
- different encryption schemes requiring different decryption routines:
- only one of these routines would be plainly visible in any instance of
- the virus (e.g. the Whale virus does it this way, if I am not mis-
- taken). A signature-driven virus scanner would have to exploit several
- signatures (one for each possible encryption method) to reliably
- identify a virus of this kind.
-
- A more sophisticated polymorphic virus (e.g. V2P6) will vary the
- sequence of instructions in its copies, by interspersing it with
- "noise" instructions (e.g. a No Operation instruction, or an
- instruction to load a currently unused register with an arbitrary
- value), by interchanging mutually independent instructions, or even
- by using various instruction sequences with identical net effects
- (e.g. Subtract A from A, and Move 0 to A, have the same net effect).
- A simple-minded, signature-based virus scanner would not be able to
- reliably identify this sort of viruses; rather, a sophisticated
- "scanning engine" has to be constructed after a thorough research into
- the particular virus.
-
- The advent of polymorphic viruses has rendered virus-scanning an ever
- more difficult and expensive endeveaour; adding more and more search
- strings to simple scanners will not adequately deal with these
- viruses.
-
- (End of proposed FAQ entry)
-
- --- Fred-Uf 1.8(L)[BETA]
- * Origin: Megabyte BBS, UUCP, Fidonet, IMEx, total messaging (1:340/201.0)
- SEEN-BY: 340/201 1000 688/13
-