Home Government Tech Policy Kaspersky source code offer means little: security firm
Kaspersky source code offer means little: security firm Featured

Kaspersky Lab founder Eugene Kaspersky's offer to allow the US government to inspect the source code of his products will not ensure it is free of malicious functions, according to an analysis posted by Rendition Infosec, a security company founded and run by ex-NSA employee Jake Williams.

The company said it was supportive of Eugene's offer but said it would not ensure security and his offer to testify before the US Congress would not sway anyone.

The US government has been ratcheting up its campaign against Kaspersky Lab products with a recommendation in the Pentagon draft budget that a ban be imposed on the use of these products by the Department of Defence.

Moscow has threatened to hit back if the US implements such a ban. Eugene has termed the US' actions as "cyber-McCarthyism".

The Rendition Infosec analysis pointed out that a code audit would take place at a certain point in time and there could be additions before a binary was compiled.

"No matter what we see in the source, Kaspersky will have to add code over time to update features. That’s how software engineering works," it said.

"Suppose they then offer to send updated source code for audit. That’s great, but who is really auditing it? This becomes a full-time job. Also, backdoors in code are particularly difficult to detect and can be extremely carefully obfuscated to make them resistant to static code analysis."

Rendition's analysis said there were further problems with a code audit: "The compiled code may contain backdoors not in the originally compiled source. These are non-trivial to detect and require a whole different set of specialised skills to find (the person performing the analysis must understand programming and reverse engineering)."

It pointed that reverse engineering was an order of magnitude harder than code auditing, but if doubts existed about a foreign government influencing the software, this was a must.

The analysis said that a final point to be considered was the fact that an anti-virus program was more or less a kernel mode rootkit with the ability to update itself remotely.

"The remote update functionality is important. With remote update functionality, even if someone audits the code the best possible outcome would be 'no backdoors were found, but Kaspersky could install malware on or completely disable any machine it is running on at will',” it said.

"While any software that implements auto-update functionality could conceivably install a malicious update (as we saw with MeDoc being used to deploy the NotPetya cyber attack against Ukraine). Reverse engineering would now need to be performed not once, but on a regular basis to identify the inclusion of new backdoors built into updates."

REASON TO CHOOSE TENDA MESH WIFI

Our Mesh WiFi system MW3 is the first in Australia market with price below AUD$200 for a set of three.

· Best valued product
· Strong signal covering up to 300m2 for MW3 and 500m2 for MW6
· Aesthetically pleasing and light weigh (blend into any room deco)
· Wireline backhauls supported
· Product units are pre-paired and easy to setup
· Not requiring phone number or email address to set up
· Wall penetration (better than other similar brands)
· Seamless WiFi roaming
· User friendly app with controls to setup a guest network, parental controls for disabling groups of devices you allocate to individuals, QoS and more

CLICK FOR MORE INFO!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the sitecame into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect