Podchaser Logo
Home
Alex Wheeler and Neel Mehta:  Owning Anti-Virus: Weaknesses in a Critical Security Component

Alex Wheeler and Neel Mehta: Owning Anti-Virus: Weaknesses in a Critical Security Component

Released Sunday, 4th June 2006
Good episode? Give it some love!
Alex Wheeler and Neel Mehta:  Owning Anti-Virus: Weaknesses in a Critical Security Component

Alex Wheeler and Neel Mehta: Owning Anti-Virus: Weaknesses in a Critical Security Component

Alex Wheeler and Neel Mehta:  Owning Anti-Virus: Weaknesses in a Critical Security Component

Alex Wheeler and Neel Mehta: Owning Anti-Virus: Weaknesses in a Critical Security Component

Sunday, 4th June 2006
Good episode? Give it some love!
Rate Episode

AV software is becoming extremely popular because of the its percieved protection. Even the average person is aware they want AV on their computer (see AOL, Netscape, Netzero, Earthlink, and other ISP television ads). What if: Instead of protecting ppl from hackers AV software was actually making it easier for hackers? This talk will outline general binary auditing techniques using AV software as an example, and demonstrate examples of remote AV vulnerabilities discovered using those techniques. Alex Wheeler is a security researcher, who specializes in reversing engineering binaries for security vulnerabilities. His research experience was cultivated during his time with ISS X-Force, which he spent auditing critical network applications and technologies for security vulnerabilities. Alex's recent audit focus on AV products has lead to the discovery of serious systemic and point vulnerabilities in many major AV products. Neel Mehta works as an application vulnerability researcher at ISS X-Force, and like many other security researchers comes from a reverse-engineering background. His reverse engineering experience was cultivated through extensive consulting work in the copy protection field, and has more recently been focused on application security. Neel has done extensive research into binary and source-code auditing, and has applied this knowledge to find many vulnerabilities in critical and widely deployed network applications.

Show More
Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Episode Tags

Do you host or manage this podcast?
Claim and edit this page to your liking.
,

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features