> -----Original Message-----
> Despite the statement of your objective it isn't clear to me what you
> think you're going to achieve.  My expectation would be a very large
> increase in the false positive rates if you attempt to use signatures
> modified in the way you describe.  Can you be more specific?  Define
> 'appropriate' and 'useful' in this context for example.

The rate of false positives is wholly dependent on the strings that you
are replacing with wildcards.

As an example, when generating signatures to identify phishing content
(say, content targeting bank customers), I wanted to be able to strip
out 'http://' (687474703a2f2f) and 'https://' (68747470733a2f2f) from
the hex dump (generated by sigtool) and replacing them with {7-8}  (aka
WILDCARD LENGTH 7 - 8) because I don't care if the protocol in the
phishing content is http or https.  This would remove 9 - 11 characters
with each replacement, allowing me to fit more of the hex dump into the
result signature which is limited to ~8k characters (including name,
file type, and offset).

Being able to replace these sorts of known strings automatically would
help speed the process of creating the signatures (which, as you
mentioned is a tough task as it is).

> If you are
> just looking for the 'names' of the viruses then forget it, there is
no
> common naming scheme which is globally accepted.  Individuals and
> organizations pick names as they find new threats, and within a very
> short time of their first appearance it is common for threats to be
> given a few different names by several anti-virus product suppliers.

This has nothing to do with looking at the names of viruses.  I'm only
concerned with looking at the output from sigtool --hex-dump and turning
it into a useful signature in a faster, more efficient manner.

--Maarten
_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to