PC-cillin Technology

Virus Pattern Scanning

After the newly found virus is analyzed, its tell-tale virus code will be extracted and added into the virus pattern database. When the antivirus program starts to scan the program files, it will compare the files against the virus pattern database and determines if they are infected with viruses. Virus Pattern Scanning method is fast and effective (such as Trend Micro's PC-cillin and ServerProtect, which applies deep scanning technology, taking about 1/20 second averagely when scanning a file real-time.) This method is used by most of the antivirus softwares. However, one disadvantage is that it is not able to detect unknown viruses and polymorphic viruses.

Integrity Checking(Check-summing)

Integrity Checking antivirus programs begin by building an initial record of the file status, including the file name, size, time, date, and contents. Then, it will append the record to the end of each file, or keep the records of all the files in a database. With the check-summing system, integrity checking antivirus programs can determine if the file is infected by monitoring and examining if the status of each file has been modified. It is like writing down the mileage everytime you stop your car. When next time you start to drive the car, you will know if anyone has driven your car by checking the mileage record. This method can detect various kinds of viruses, but one biggest disadvantage is that it causes false alarm. Also, it can not tell what kind of virus a file is infected with, and can not detect Stealth viruses.

Rule-based Virus Traps

Rule-based Virus Traps are a TSR scanning technology to monitor the computer's behavior. It collects all the virus activities. When any program resident in memory starts the unusual behavior, the system will detect and then alert the user. Rule-based Virus Traps have some advantages: responding fast, easy to process, and able to detect all kinds of viruses. On the other hand, the disadvantages are it is difficult to design and hard to cover thoroughly. However, with today's ever-changing viruses, Rule-based Virus Traps at least offer a new point of view for security. The current version of Trend Micro's PC-cillin comprises 12 traps for the suspicious virus activities, in order to prevent the damage in advance. 

Software Emulation Scanning

Software Emulation technology is designed to tackle Polymorphic/Mutation viruses. Every time Polymorphic/Mutation viruses start the infection, they will generate random numbers, encrypt the numbers and then insert them into the infected files. Traditional virus pattern matching method can not detect this kind of viruses at all, while the Software Emulation technology can emulate CPU activities, executes the decoding program of mutation engines under the specially designed DOS virtual machine, safely and completely uncover the Polymorphic/Mutation viruses for scanning.

VICE(Virus Instruction Code Emulation)

Following the Software Emulation technology, Virus Instruction Code Emulator is another breaking-through technology. Since the Software Emulation method can create a Protected Mode DOS virtual machine, emulate CPU activities and execute the program to have polymorphic viruses expose themselves, similar technology can be applied to analyze normal application softwares for suspicious virus codes. Therefore, using the same method as engineers use to determine if a program contains virus codes, VICE first creates an expert knowledge base system after analysis, then runs the new viruses through the Software Emulation method, and derives the new virus pattern for later generated viruses.

Real-time I/O Scanning

Real-time I/O Scanning filters data I/O stream for virus pattern matching, with a purpose to block the virus before it executes. Theoretically, real-time I/O scanning will affect the data transferring speed. With the real-time I/O scanning, however, whenever a file is coming in, it will be scanned once. There is no significant influence as a whole.

MacroTrap

Integrated with the virus pattern matching and rule-based virus trap technology, MacroTrap draws upon the virus behavior rule base to detect known and unknown macro viruses. Using the OLE2 technology to separate macros from the document, MacroTrap scans at high speed and can remove macro viruses effectively and completely.

 
  

 

| Virus | Products | Free Scan | Support | Download | Buy | Home | Corporate Users |

©Copyright 2001 Trend Micro Incorporated. All rights reserved. Terms of Use Privacy Policy