Instance attack: an explanation-based vulnerability analysis framework against DNNs for malware detection

被引:0
|
作者
Sun R. [1 ]
Guo S. [2 ]
Xing C. [1 ]
Duan Y. [3 ]
Yang L. [4 ]
Guo X. [5 ]
Pan Z. [1 ]
机构
[1] Army Engineering University of PLA, Nanjing
[2] National Computer Network and Information Security Management Center, Beijing
[3] Army Military Transportation University of PLA, Zhenjiang
[4] National University of Defense Technology, Changsha
[5] University of Science and Technology Beijing, Beijing
关键词
Adversarial examples; DNN; Interpretable; Malware;
D O I
10.7717/PEERJ-CS.1591
中图分类号
学科分类号
摘要
Deep neural networks (DNNs) are increasingly being used in malware detection and their robustness has been widely discussed. Conventionally, the development of an adversarial example generation scheme for DNNs involves either detailed knowledge concerning the model (i.e., gradient-based methods) or a substantial quantity of data for training a surrogate model. However, under many real-world circumstances, neither of these resources is necessarily available. Our work introduces the concept of the instance-based attack, which is both interpretable and suitable for deployment in a black-box environment. In our approach, a specific binary instance and a malware classifier are utilized as input. By incorporating data augmentation strategies, sufficient data are generated to train a relatively simple and interpretable model. Our methodology involves providing explanations for the detection model, which entails displaying the weights assigned to different components of the specific binary. Through the analysis of these explanations, we discover that the data subsections have a significant impact on the identification of malware. In this study, a novel function preserving transformation algorithm designed specifically for data subsections is introduced. Our approach involves leveraging binary diversification techniques to neutralize the effects of the most heavily-weighted section, thus generating effective adversarial examples. Our algorithm can fool the DNNs in certain cases with a success rate of almost 100%. Instance attack exhibits superior performance compared to the state-of-the-art approach. Notably, our technique can be implemented in a black-box environment and the results can be verified utilizing domain knowledge. The model can help to improve the robustness of malware detectors. © Copyright 2023 Sun et al. Distributed under Creative Commons CC-BY 4.0
引用
收藏
相关论文
共 50 条
  • [1] Instance attack: an explanation-based vulnerability analysis framework against DNNs for malware detection
    Sun, Ruijin
    Guo, Shize
    Xing, Changyou
    Duan, Yexin
    Yang, Luming
    Guo, Xi
    Pan, Zhisong
    [J]. PEERJ COMPUTER SCIENCE, 2023, 9
  • [2] A Dynamic Analysis-Powered Explanation Framework for Malware Detection
    Zhu, Huijuan
    Chen, Xilong
    Wang, Liangmin
    Xu, Zhicheng
    Sheng, Victor S.
    [J]. IEEE Transactions on Knowledge and Data Engineering, 2024, 36 (12) : 7483 - 7496
  • [3] A defense framework against malware and vulnerability exploits
    Zhang, Meng
    Raghunathan, Anand
    Jha, Niraj K.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (05) : 439 - 452
  • [4] A defense framework against malware and vulnerability exploits
    Meng Zhang
    Anand Raghunathan
    Niraj K. Jha
    [J]. International Journal of Information Security, 2014, 13 : 439 - 452
  • [5] HammerDodger: A Lightweight Defense Framework against RowHammer Attack on DNNs
    Cheng Gongye
    Luo, Yukui
    Xu, Xiaolin
    Fei, Yunsi
    [J]. 2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC, 2023,
  • [6] Structural Attack against Graph Based Android Malware Detection
    Zhao, Kaifa
    Zhou, Hao
    Zhu, Yulin
    Zhan, Xian
    Zhou, Kai
    Li, Jianfeng
    Yu, Le
    Yuan, Wei
    Luo, Xiapu
    [J]. CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 3218 - 3235
  • [7] EXPLANATION-BASED LEARNING - A KNOWLEDGE LEVEL ANALYSIS
    ARMENGOL, E
    PLAZA, E
    [J]. ARTIFICIAL INTELLIGENCE REVIEW, 1995, 9 (01) : 19 - 35
  • [8] A Vulnerability based Attack Detection and Mitigation in Cloud SaaS Framework
    Saisindhutheja R.
    Shyam G.K.
    Makka S.
    [J]. Journal of Engineering Science and Technology Review, 2022, 15 (05) : 158 - 169
  • [9] Attack Tree Based Android Malware Detection with Hybrid Analysis
    Zhao, Shuai
    Li, Xiaohong
    Xu, Guangquan
    Zhang, Lei
    Feng, Zhiyong
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 380 - 387
  • [10] HIGHER-ORDER AND MODAL LOGIC AS A FRAMEWORK FOR EXPLANATION-BASED GENERALIZATION
    DIETZEN, S
    PFENNING, F
    [J]. MACHINE LEARNING, 1992, 9 (01) : 23 - 55