GenDroid: A query-efficient black-box android adversarial attack framework

被引:0
|
作者
Xu, Guangquan [1 ,2 ]
Shao, Hongfei [2 ]
Cui, Jingyi [2 ]
Bai, Hongpeng [2 ]
Li, Jiliang [3 ]
Bai, Guangdong [4 ]
Liu, Shaoying [5 ]
Meng, Weizhi [6 ]
Zheng, Xi [7 ]
机构
[1] Qingdao Huanghai Univ, Big Data Sch, Qingdao, Peoples R China
[2] Tianjin Univ, Coll Intelligence & Comp, Tianjin Key Lab Adv Networking TANK, Tianjin, Peoples R China
[3] Xi An Jiao Tong Univ, Sch Cyber Sci & Engn, Xian, Peoples R China
[4] Univ Queensland, Sch Informat Technol & Elect Engn, St Lucia, Australia
[5] Hiroshima Univ, Grad Sch Adv Sci & Engn, Hiroshima, Japan
[6] Tech Univ Denmark, DTU Compute, Lyngby, Denmark
[7] Macquarie Univ, Sch Comp, Macquarie Pk, Australia
关键词
Android; Query-efficient; Adversarial examples; Black-box attack; MALWARE; SYSTEMS;
D O I
10.1016/j.cose.2023.103359
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security problems of Android applications have been gradually exposed with the increasing popularity of the Android OS. Machine learning (ML) and deep learning (DL) based Android malware detection is still suffering from adversarial attacks, although it has better performance than traditional methods. In this paper, we propose a query-efficient black-box attack method called GenDroid, which can generate high-quality Android adversarial examples with a low number of queries. We take GenDroid as an attack framework and extend it with the attention mechanism and JSMA algorithm to improve the efficiency of adversarial example production. We evaluate the effectiveness of our attack on two state-of-the-art Android malware detection schemes, Drebin and MaMaDroid. Compared with four state-of-the-art adversarial attacks on real-world datasets, GenDroid achieves higher misclassification rates with significantly the fewest number of queries on the two datasets. In addition, we have validated the effectiveness of our attack on real-world commercial anti-virus engines. Finally, to enhance the security of Android malware detector and defend against the GenDroid attack, we use combined features consisting of the associated Android features, the spatial properties of Android adversarial examples and the uncertainty to detect adversarial examples, which can achieve a high detection rate of 95.71%.& COPY; 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Query-Efficient Black-Box Adversarial Attack with Random Pattern Noises
    Yuito, Makoto
    Suzuki, Kenta
    Yoneyama, Kazuki
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2022, 2022, 13407 : 303 - 323
  • [2] Query-Efficient Black-Box Adversarial Attack With Customized Iteration and Sampling
    Shi, Yucheng
    Han, Yahong
    Hu, Qinghua
    Yang, Yi
    Tian, Qi
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 45 (02) : 2226 - 2245
  • [3] Towards Query-efficient Black-box Adversarial Attack on Text Classification Models
    Yadollahi, Mohammad Mehdi
    Lashkari, Arash Habibi
    Ghorbani, Ali A.
    [J]. 2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [4] Query-Efficient Black-Box Attack by Active Learning
    Li, Pengcheng
    Yi, Jinfeng
    Zhang, Lijun
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2018, : 1200 - 1205
  • [5] DifAttack: Query-Efficient Black-Box Adversarial Attack via Disentangled Feature Space
    Liu, Jun
    Zhou, Jiantao
    Zeng, Jiandian
    Tian, Jinyu
    [J]. THIRTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 4, 2024, : 3666 - 3674
  • [6] Query-Efficient Target-Agnostic Black-Box Attack
    Moraffah, Raha
    Liu, Huan
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2022, : 368 - 377
  • [7] Query-Efficient Black-Box Adversarial Attacks on Automatic Speech Recognition
    Tong, Chuxuan
    Zheng, Xi
    Li, Jianhua
    Ma, Xingjun
    Gao, Longxiang
    Xiang, Yong
    [J]. IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2023, 31 : 3981 - 3992
  • [8] Query-Efficient Decision-Based Black-Box Patch Attack
    Chen, Zhaoyu
    Li, Bo
    Wu, Shuang
    Ding, Shouhong
    Zhang, Wenqiang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5522 - 5536
  • [9] Sparse-RS: A Versatile Framework for Query-Efficient Sparse Black-Box Adversarial Attacks
    Croce, Francesco
    Andriushchenko, Maksym
    Singh, Naman D.
    Flammarion, Nicolas
    Hein, Matthias
    [J]. THIRTY-SIXTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FOURTH CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE / THE TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2022, : 6437 - 6445
  • [10] Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks
    Yan, Ziang
    Guo, Yiwen
    Zhang, Changshui
    [J]. ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 32 (NIPS 2019), 2019, 32