Adversarial Examples for Malware Detection

被引:305
|
作者
Grosse, Kathrin [1 ]
Papernot, Nicolas [2 ]
Manoharan, Praveen [1 ]
Backes, Michael [1 ]
McDaniel, Patrick [2 ]
机构
[1] Saarland Univ, CISPA, Saarland Informat Campus, Saarbrucken, Germany
[2] Penn State Univ, Sch Elect Engn & CS, State Coll, PA USA
来源
基金
欧洲研究理事会;
关键词
D O I
10.1007/978-3-319-66399-9_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning models are known to lack robustness against inputs crafted by an adversary. Such adversarial examples can, for instance, be derived from regular inputs by introducing minor yet carefully selected-perturbations. In this work, we expand on existing adversarial example crafting algorithms to construct a highly-effective attack that uses adversarial examples against malware detection models. To this end, we identify and overcome key challenges that prevent existing algorithms from being applied against malware detection: our approach operates in discrete and often binary input domains, whereas previous work operated only in continuous and differentiable domains. In addition, our technique guarantees the malware functionality of the adversarially manipulated program. In our evaluation, we train a neural network for malware detection on the DREBIN data set and achieve classification performance matching state-of-the-art from the literature. Using the augmented adversarial crafting algorithm we then manage to mislead this classifier for 63% of all malware samples. We also present a detailed evaluation of defensive mechanisms previously introduced in the computer vision contexts, including distillation and adversarial training, which show promising results.
引用
收藏
页码:62 / 79
页数:18
相关论文
共 50 条
  • [1] An Empirical Study on the Effectiveness of Adversarial Examples in Malware Detection
    Ban, Younghoon
    Kim, Myeonghyun
    Cho, Haehyun
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 139 (03): : 3535 - 3563
  • [2] Assessing Transferability of Adversarial Examples against Malware Detection Classifiers
    Wang, Yixiang
    Liu, Jiqiang
    Chang, Xiaolin
    CF '19 - PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS, 2019, : 211 - 214
  • [3] Creating valid adversarial examples of malware
    Kozak, Matous
    Jurecek, Martin
    Stamp, Mark
    Di Troia, Fabio
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (4) : 607 - 621
  • [4] Transferability of Adversarial Examples in Machine Learning-based Malware Detection
    Hu, Yang
    Wang, Ning
    Chen, Yimin
    Lou, Wenjing
    Hou, Y. Thomas
    2022 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2022, : 28 - 36
  • [5] On Effectiveness of Adversarial Examples and Defenses for Malware Classification
    Podschwadt, Robert
    Takabi, Hassan
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 : 380 - 393
  • [6] Adversarial Examples for CNN-Based Malware Detectors
    Chen, Bingcai
    Ren, Zhongru
    Yu, Chao
    Hussain, Iftikhar
    Liu, Jintao
    IEEE ACCESS, 2019, 7 : 54360 - 54371
  • [7] POSTER: Breaking Graph-based IoT Malware Detection Systems Using Adversarial Examples
    Abusnaina, Ahmed
    Khormali, Aminollah
    Alasmary, Hisham
    Park, Jeman
    Anwar, Afsah
    Meteriz, Ulku
    Mohaisen, Aziz
    PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 290 - 291
  • [8] Exploiting smartphone defence: a novel adversarial malware dataset and approach for adversarial malware detection
    Kim, Tae hoon
    Krichen, Moez
    Alamro, Meznah A.
    Mihoub, Alaeddine
    Avelino Sampedro, Gabriel
    Abbas, Sidra
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, : 3369 - 3384
  • [9] Adversarial Attacks on Mobile Malware Detection
    Shahpasand, Maryam
    Hamey, Len
    Vatsalan, Dinusha
    Xue, Minhui
    2019 IEEE 1ST INTERNATIONAL WORKSHOP ON ARTIFICIAL INTELLIGENCE FOR MOBILE (AI4MOBILE '19), 2019, : 17 - 20
  • [10] Vulnerability Evaluation of Android Malware Detectors against Adversarial Examples
    Ijas, A. H.
    Vinod, P.
    Zemmari, Akka
    Harikrishnan
    Poulose, Godvin
    Jose, Don
    Mercaldo, Francesco
    Martinelli, Fabio
    Santone, Antonella
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KSE 2021), 2021, 192 : 3320 - 3331