The slide only lists known AVs as potential targets… I guess it may be better to be on that list than to be missing (to be missing could imply there’s no need to target those, as they have already been dealt with) ;D

Anyway, I don’t see any need for “hacking” here (in the network sense)… if you want to check if a particular antivirus detects a specific virus or not, you can just install the product and scan your file. If you want to find out how it works, you can install it and spend a lot of time on reverse engineering the code; there’s no way to prevent that. Getting undetected virus samples? Come on, you crawl the web or monitor some mail servers and you’ll have plenty of them (plus, there’s sample exchange going on between antivirus companies, and law enforcement may be included, so you really don’t have to hack them all if you want the samples).

Of course I can’t rule out security issues in our, or any other product - that’s why we have the bug bounty program.