"According to Matousec, nearly three-dozen Windows desktop security titles, including ones from Symantec, McAfee, Trend Micro, BitDefender, Sophos and others, can be exploited using the argument-switch tactic. Matousec said it had tested the technique on Windows XP SP3 and Vista SP1 on 32-bit machines."
The current official statement (not mine, subject to change, batteries not included):
Symantec is aware of the research. This is a narrowly focused test that examines potential bypass techniques for any security solution that implements kernel mode hooking. This is precisely why Symantec adds multiple layers of security to our products in order to prevent malware, and in this case, even the code that would facilitate the substituting of benign code for malicious code, from getting onto users’ computers in the first place. In particular, Symantec’s Intrusion Prevention (IPS) and Reputation-Based Security play a large role in blocking these types of threats. These additional layers of defenses were not examined as part of the matousec.com investigation.
Hi Garrett
Although not to do with the tests which is what this thread is about,
With NIS 2011 installed and testing a Rogue which used Windows settings to block Security Software from running, Norton was able to keep running even after the rogue forced a restart of the PC in the attempt. It blocked MBAM and someone else could not start Avast
So I was happy to see that Norton this time couldn't be stopped, the only thing that happened to do with Windows and Norton was Windows could not see an AV was installed until I removed the registry entries and restarted the PC.
It was a MSE UI look alike but with russian (I think) type.
"According to Matousec, nearly three-dozen Windows desktop security titles, including ones from Symantec, McAfee, Trend Micro, BitDefender, Sophos and others, can be exploited using the argument-switch tactic. Matousec said it had tested the technique on Windows XP SP3 and Vista SP1 on 32-bit machines."