| ▲ | labelbabyjunior 5 hours ago | |||||||
They kind of have to, though. If malware exploits a privilege escalation vuln, what's the AV going to do about it when it's reduced to the software equivalent of a UK police officer? Observe and report? Stop or I'll say "stop" again? AV requires great power, which requires great responsibility. The second part is what often eludes AV developers. | ||||||||
| ▲ | EvanAnderson 5 hours ago | parent | next [-] | |||||||
The OS should do the SYSTEM-level lifting and scanning processes and behavior analysis should run sandboxed as low priv processes. It would require a clearly defined API and I feel like MSFT was always reticent to commit, leaving AV manufacturers to create hacky nightmares. | ||||||||
| ||||||||
| ▲ | bux93 3 hours ago | parent | prev | next [-] | |||||||
Windows has separate SeBackupPrivilege for backup software, so why not for AV? | ||||||||
| ▲ | formerly_proven 3 hours ago | parent | prev [-] | |||||||
“Because the remediation component requires SYSTEM, the entire AV needs to run as SYSTEM and we have to unpack malware in the kernel” | ||||||||