1997 was something of a watershed for me:
my first Virus Bulletin conference paper, and indeed my first
presentation at an international conference. Not that many people were
there to see it: it was, after all, about Macs, and even in the AV
industry at that time people tended to underestimate the significance of
malware on the Mac. And in fact, a great deal of the paper was about
macro viruses, which rarely had Mac-specific payloads, but most of which
spread perfectly happily on Macs that supported WordBasic. Making Mac
users – who rarely used anti-virus – something of a Typhoid Mary in the
corner of academia and medical research that I worked in at that time.
That 1997 paper on Macs and Macros – the State of the Macintosh Nation
is only of historic interest now, of course: even I only have one Mac
that still runs a pre-OS X version of the Operating System, and I can’t
remember the last time I used it. As it happens, while Mac security has
played a large part in my professional life since, my next 12 Virus Bulletin conference papers made little or no reference to Mac issues.
However, number 14, presented a couple of weeks ago at Virus Bulletin’s 23rd annual conference
by myself and co-author Lysa Myers returns to two of my favourite
hobbyhorses – Mac security, and security product testing. Lysa was
working with Mac security specialists Intego
at the time we wrote the paper, but is now a colleague at ESET, I’m
delighted to say. Not only does she have a longer track record in the
commercial anti-malware industry than I do, but she also has
considerable experience in product testing with West Coast Labs. The
paper Mac Hacking: the Way to Better Testing? is now available from the ESET Threat Center Conference Papers page by kind permission of Virus Bulletin.
So what’s the new paper about? Primarily, the difficulties
that face testers when they test security products on recent versions of
OS X, introduced by Apple’s own countermeasures against malware:
especially XProtect.plist. While these measures do enhance end-user
security, they make it harder to move away from the static testing model
that mainstream Windows product testing has to a large extent evolved
beyond. Here’s the abstract:
Anti-malware testing on the Windows platform remains highly
controversial, even after almost two decades of regular and frequent
testing using millions of malware samples. Macs have fewer threats and
there are fewer prior tests on which to base a testing methodology, so
establishing sound mainstream testing is even trickier. But as both Macs
and Mac malware increase in prevalence, the importance of testing the
software intended to supplement the internal security of OS X increases
too.
What features and scenarios make Mac testing so much
trickier? We look at the ways in which Apple’s intensive work on
enhancing OS X security internally with internal detection of known
malware has actually driven testers back towards the style of static
testing from which Windows testing has moved on. And in what ways might
testing a Mac be easier? What can a tester do to make testing more
similar to real-world scenarios, and are there things that should
reasonably be done that would make a test less realistic yet more fair
and accurate? This paper looks to examine the testing scenarios that
are unique to Macs and OS X, and offers some possibilities for ways to
create a test that is both relevant and fair.
There’s also an article for Infosecurity Magazine that summarizes the paper at some length: Mac Product Testing: After the (Flash) Flood.
Lysa and I will be returning to the topic in a series of
blog articles here in the next few weeks, with the intention of
clarifying the difficulties and suggesting ways in which Mac testing can
be made fairer and more accurate, as well as the implications for other
testing platforms.
David Harley CITP FBCS CISSP
Small Blue-Green World
ESET Senior Research Fellow
Small Blue-Green World
ESET Senior Research Fellow
No comments:
Post a Comment