Innovative Breakthrough – Dedicated to China

The original report is in Chinese, and this version is an AI-translated edition.

At 10: 00 a.m. on October 1, 2024, the first CPU architecture version of the VILLM was transplanted successfully and the internal test was completed. The model used activation value quantification, weight quantification and quantitative perception training. In that invention, the CPU run almost without precision attenuation and the space occupation of the disk and the memory is greatly reduced, In addition, special algorithm are used to accelerate matrix multiplication and attention calculation, which further narrow that gap between CPU and GPU environment running speed, this is a solid step towards low-cost localized deployment of large models of threat analysis in defense scenarios. The Antiy engineering team presented this phased technological innovation achievement as a gift to the 75th anniversary of the founding of the People’s Republic of China. For the cybersecurity of our motherland, our innovation will never stop!

1.Antiy’s Milestone in Technological Innovation

2001

AreaSystem security
Product formAntiy GhostBuster (predecessor of Antiy IEP)
Demand scenarioNew remote control Trojan and Rookit samples appeared in large quantity, and the traditional anti-virus software was not enough to deal with it
Technological innovationIntegrated tools for scanning, real-time protection and system analysis

2002

AreaTraffic scenario
Product formP-A Backbone Network Traffic Virus Monitoring System Prototype (Antiy PTD)
Demand scenarioThe network worm breaks out in large scale and lacks the ability to monitor
Technological innovationFull Rule Virus Detection in Gigabit Network

2004

AreaPerception Capture
Product formSecurity analysis seat tool
Demand scenarioImprove that efficiency of malware analysis
Technological innovationInteractive Integrated Analysis Tool
AreaEngine
Product formAVL SDK Anti-virus Engine
Demand scenarioMore business and device scenarios create the need for malware filtering
Technological innovationAnti-virus engine that can be embedded in multiple scenarios
AreaAnalysis platform
Product formAntiy VX _ Plat Sample Analysis Platform (Prototype of Cyber-brain)
Demand scenarioThe number of Trojans has soared and manual analysis cannot adapt
Technological innovationAutomatic analysis of batch samples based on deep learning

2006

AreaSystem security
Product formATool, A System Kernel Analysis Tool
Demand scenarioThe Windows system environment is complex, making it difficult to detect and completely eliminate malware.
Technological innovationHost kernel analysis and object four-dimensional credit mechanism analysis

2008

AreaPerception Capture
Product formAttack Capture honeynet probe (ARM version)
Demand scenarioOverall reduction of honeynet probe deployment nodes
Technological innovationBased on Low Cost ARM Device
AreaAnalysis platform
Product formSecurity analysis seat tool
Demand scenarioImprove that efficiency of malware analysis
Technological innovationInteractive Integrated Analysis Tool
AreaEngine
Product formAVL SDK Anti-virus Engine (Cloud Interface)
Demand scenarioThe rule base is becoming increasingly large and the local load needs to be reduced
Technological innovationDetection Based on Public Cloud
AreaEngine
Product formAVL SDK Anti-Virus Engine (for Network Edition)
Demand scenarioHigh-speed network security support equipment
Technological innovationEngine support for multicore MIPS platform (including Cavium)

2009

AreaAnalysis platform
Product formMassive Malicious Code Analysis Pipeline (First Generation)
Demand scenarioThe number of malicious code grows geometrically
Technological innovationAn Automated Analysis Architecture Based on Three-Bus (Object, Control, Result) Results

2010

AreaEngine
Product formTruststeam Module of AVL SDK Threat Detection Engine
Demand scenarioBlocking threat in control channel and transmission channel
Technological innovationPayload Blocking Technology for Download Source and C2 Block

2011

AreaEngine
Product formAVL SDK threat detection engine (for Mobile)
Demand scenarioThe popularity of mobile intelligent terminals is bound to bring about a significant increase in malware on mobile terminals
Technological innovationMobile anti-virus engine (Android version)

2012

AreaAnalysis platform
Product formMassive Malware Analysis Pipeline (Second Generation)
Demand scenarioTo achieve effective human-machine interaction
Technological innovationThe Pipelining of Man-Machine Cooperation and Experience Iteration
AreaAnalysis platform
Product formPersistent Threat Analysis System
Demand scenarioAPT attacks extensively utilize formatted documents, leading to a contradiction between analysis requirements and confidentiality.
Technological innovationPre-deployment of sandbox
AreaEngine
Product formAntiy IEP (White List Version)
Demand scenarioThe customer’s sensitive information cannot be transmitted to the security manufacturer
Technological innovationThe Detection Mechanism Based on the Private Cloud

2013

AreaEngine
Product formAVML Search Engine
Demand scenarioAPT analysis, and sample correlation and traceability
Technological innovationSearch for Dynamic and Static Analysis Vector and Sample Homology Correlation

2014

AreaSystem security
Product formAntiy IEP (Virtual Version)
Demand scenarioTraditional anti-virus products do not adapt to virtualization environment
Technological innovationLightweight Protection for Virtualization Scenarios

2015

AreaSystem security
Product formAntiy IEP (Home-made version)
Demand scenarioThe demand for system security protection under the trend of domesticization and self-controllability
Technological innovationReinforcement and Real-time Protection of Domestic Operating System

2016

AreaTraffic
Product formSea Threat Detection System (Full Element Edition)
Demand scenarioMeet the analysis and traceability requirements for advanced threats, and strike a balance between the five-tuple and full traffic retention.
Technological innovationFull element collection and metadata extraction on the traffic side, and collection and configuration as required
AreaAnalysis platform
Product formCyber super brain analysis platform
Demand scenarioThe various perception and capture analysis capabilities need to be integrated.
Technological innovationA multi-source heterogeneous sample and event analysis system based on cloud computing architecture

2017

AreaEngine
Product formNG-AVL SDK Next Generation Threat Detection Engine
Demand scenarioBuild detection capabilities that are difficult for attackers to predict, and empower threat intelligence and situational awareness to capture them.
Technological innovationFull File Object Recognition and Vector Extraction

2019

AreaDomain-wide capability
Product formFull-line products and support system
Demand scenarioThere is no uniform definition of attack tactics and techniques and measurement of protection capability in the face of attack
Technological innovationFull-line product support kill chain analysis and ATT&CK threat framework tactical tag output

2021

AreaCloud security
Product formAntiy UWP
Demand scenarioIn the context of the mixed architecture of public cloud and private cloud and containerization of business applications, heterogeneous host assets require fine-grained control and threat prevention
Technological innovationIntegrated protection for heterogeneous workloads, integrating cloud host security, micro-isolation and container security
AreaEngine
Product formVILLM security computing power chip (prototype)
Demand scenarioThe computing power of domestic general-purpose chips is temporarily insufficient, which restricts the operation of security capability
Technological innovationAuxiliary acceleration of the test engine

2022

PhilosophyThe object of prevention and control of full-line products is extended from malicious programs to full-capacity execution programs and data
Demand scenarioThe business structure becomes more and more complex, the defense links increase day by day, the attackers contaminate the supply chain, and the defense complexity is intensified by using the trusted program

2023

AreaDomain-wide capability
Product formVILLM (Virus Inspection Large Language Model)
Demand scenarioImprove the automation level of network attacks manually and comprehensively
Technological innovationAnalysis of binary executable entities without any limit on the length of the context

2024

AreaBusiness security
Product formAPI radar
Demand scenarioAPI interfaces become important exposed and attack surfaces
Technological innovationSort out API assets to find exposed areas and protection requirements
AreaDomain-wide capability
Product formVILLM (CPU version)
Demand scenarioRequirement for system and flow side to increase detection capacity
Technological innovationA large model module for threat analysis that can operate on a single machine

Appendix: About Antiy

Antiy is committed to enhancing the network security defense capabilities of its customers and effectively responding to security threats. Through more than 20 years of independent research and development, Antiy has developed technological leadership in areas such as threat detection engines, advanced threat countermeasures, and large-scale threat automation analysis.

Antiy has developed IEP (Intelligent Endpoint Protection System) security product family for PC, server and other system environments, as well as UWP (Unified Workload Protect) security products for cloud hosts, container and other system environments, providing system security capabilities including endpoint antivirus, endpoint protection (EPP), endpoint detection and response (EDR), and Cloud Workload Protection Platform (CWPP) , etc. Antiy has established a closed-loop product system of threat countermeasures based on its threat intelligence and threat detection capabilities, achieving perception, retardation, blocking and presentation of the advanced threats through products such as the Persistent Threat Detection System (PTD), Persistent Threat Analysis System (PTA), Attack Capture System (ACS), and TDS. For web and business security scenarios, Antiy has launched the PTF Next-generation Web Application and API Protection System (WAAP) and SCS Code Security Detection System to help customers shift their security capabilities to the left in the DevOps process. At the same time, it has developed four major kinds of security service: network attack and defense logic deduction, in-depth threat hunting, security threat inspection, and regular security operations. Through the Threat Confrontation Operation Platform (XDR), multiple security products and services are integrated to effectively support the upgrade of comprehensive threat confrontation capabilities.

Antiy provides comprehensive security solutions for clients with high security requirements, including network and information authorities, military forces, ministries, confidential industries, and critical information infrastructure. Antiy has participated in the security work of major national political and social events since 2005 and has won honors such as the Outstanding Contribution Award and Advanced Security Group. Since 2015, Antiy’s products and services have provided security support for major spaceflight missions including manned spaceflight, lunar exploration, and space station docking, as well as significant missions such as the maiden flight of large aircraft, escort of main force ships, and Antarctic scientific research. We have received several thank-you letters from relevant departments.

Antiy is a core enabler of the global fundamental security supply chain. Nearly a hundred of the world’s leading security and IT enterprises have chosen Antiy as their partner of detection capability. At present, Antiy’s threat detection engine provides security detection capabilities for over 1.3 million network devices and over 3 billion smart terminal devices worldwide, which has become a “national-level” engine. As of now, Antiy has filed 1,877 patents in the field of cybersecurity and obtained 936 patents. It has been awarded the title of National Intellectual Property Advantage Enterprise and the 17th (2015) China Patent Excellence Award.

Antiy is an important enterprise node in China emergency response system and has provided early warning and comprehensive emergency response in major security threats and virus outbreaks such as “Code Red”, “Dvldr”, “Heartbleed”, “Bash Shellcode” and “WannaCry”. Antiy conducts continuous monitoring and in-depth analysis against dozens of advanced cyberspce threat actors (APT groups) such as “Equation”, “White Elephant”, “Lotus” and “Greenspot” and their attack actions, assisting customers to form effective protection when the enemy situation is accurately predicted.