Risk
1/5/2011
10:52 AM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Japan To Ban Virus Creation? Bad Idea

The Japanese paper, the Yomiuri Shimbun, ran a story during the holidays about how the Japan Ministry of Justice wants to criminalize the creation of viruses. If they pursue this course, it's only going to get messy for security professionals there.

The Japanese paper, the Yomiuri Shimbun, ran a story during the holidays about how the Japan Ministry of Justice wants to criminalize the creation of viruses. If they pursue this course, it's only going to get messy for security professionals there.I understand the desire with efforts like this: make the creation of viruses illegal and (theoretically) the number of viruses in circulation, and thereby risk, goes down.

If only it were that simple.

According to the story, Computer virus creation (and possibly even mere possession) is to be banned. Sources told the paper that the Japan Ministry of Justice is clamping down because more government offices and networks are suffering cyber-attacks.

I could understand criminalizing the release of a virus or a worm or a Trojan, but not the creation. First, what exactly is a 'virus'? Do they mean only viruses that spread through user action as well as Trojans, worms, and spyware? I'll bet they mean 'malware' in the broader sense.

First, such a move could hamper research. Legitimate research. For instance, Microsoft was kicking around the idea of using worms to quickly find at-risk unpatched systems and then remedy them. We covered that story in my February 20, 2008 post Microsoft Moves To Squash 'Friendly' Worm. On the face of it I didn't think using worms to disseminate patches or fight other worms was a good idea. I certainly don't now: there are just too many variables that could go wrong given the state of today's technology. However, it's certainly a noteworthy idea that deserves legitimate research.

You think that idea is an outlier? I don't. There are plenty of similarities between security software and malicious software. Remote monitoring and management tools can be used to steal data and snoop, as easily as they can be used to help a user in trouble. Vulnerability scanners can be used to try to find vulnerabilities on systems so that you can then attack those systems, and they can be used to find vulnerable systems for patching. How about password crackers? They're a vital utility among security professionals necessary to audit the strength of passwords in an organization, for cracking forgotten passwords on documents and the systems a company owns, and even law enforcement who need to access data when they have a warrant but not the password.

Dual-use software is abundant in this industry.

But maybe not in Japan, depending on how the law is crafted.

This news story came to my attention via @weldpond, Chris Wysopal, on Twitter. Wysopal is the CTO at web application security firm Veracode, and he was a vulnerability researcher at the hacker think tank the L0pht. He's always been a advocate of the responsible disclosure of security vulnerabilities and security researchers. I was curious to learn more about what he thought on the topic, and if his thoughts were in line with my own. I asked him, in an email, what he thought and here's his reply:

This is an extremely complex issue to get right. The functionality overlap between malware and remote administration and security tools is very big. And if it is truly creation and not possession would customization of a Zeus toolkit become creation and not just possession? Would repacking malware mean you just created a new virus. This should be a concern for all security tool developers, commercial and open source. Many tools, including ones I have been involved with, L0phtCrack and netcat, have been flagged by antivirus products as malware.

That's how laws with good intentions create bad outcomes. Not only would it fail to stop malware creation and dissemination, but it could criminalize legitimate research and legitimate products.

Let's hope this idea goes nowhere, and certainly doesn't spread beyond Japan.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-4293
Published: 2015-07-30
The packet-reassembly implementation in Cisco IOS XE 3.13S and earlier allows remote attackers to cause a denial of service (CPU consumption or packet loss) via fragmented (1) IPv4 or (2) IPv6 packets that trigger ATTN-3-SYNC_TIMEOUT errors after reassembly failures, aka Bug ID CSCuo37957.

CVE-2014-7912
Published: 2015-07-29
The get_option function in dhcp.c in dhcpcd before 6.2.0, as used in dhcpcd 5.x in Android before 5.1 and other products, does not validate the relationship between length fields and the amount of data, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory c...

CVE-2014-7913
Published: 2015-07-29
The print_option function in dhcp-common.c in dhcpcd through 6.9.1, as used in dhcp.c in dhcpcd 5.x in Android before 5.1 and other products, misinterprets the return value of the snprintf function, which allows remote DHCP servers to execute arbitrary code or cause a denial of service (memory corru...

CVE-2015-2977
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to create arbitrary files, and consequently execute arbitrary code, via unspecified vectors.

CVE-2015-2978
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to bypass authentication and complete a conference-room reservation via unspecified vectors, as demonstrated by an "unintentional reservation."

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!