This document discusses attacking and exploiting antivirus software. It begins by describing how antivirus engines work and how their functionality can increase vulnerabilities. The document then details initial experiments fuzzing 14 antivirus engines, finding vulnerabilities like heap overflows and integer overflows. Specific vulnerabilities are listed for products like Avast, AVG, and BitDefend

{{#tags}}- {{label}}
{{/tags}}