Chapter 3: Antivirus Research Approaches

In this chapter, you will learn about the Windows operating system protection rings concept, we will introduce two of our real-life bypass examples, and you will also learn the basic three vulnerabilities that can be used to bypass antivirus software.

After explaining what leads are, how they help us, and how to gather them to start conducting antivirus research, we have now come to the stage where it is time to choose which approach is most appropriate for conducting research on antivirus software and then starting to research the leads we found in the previous chapter.

In this chapter, we will go through the following topics:

  • Understanding the approaches to antivirus research
  • Introducing the Windows ...

Get Antivirus Bypass Techniques now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.