MultiEvasion: Evasion Attacks Against Multiple Malware Detectors

被引:0
|
作者
Liu, Hao [1 ]
Sun, Wenhai [2 ]
Niu, Nan [1 ]
Wang, Boyang [1 ]
机构
[1] Univ Cincinnati, Cincinnati, OH 45221 USA
[2] Purdue Univ, W Lafayette, IN 47907 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/CNS56114.2022.9947227
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
End-to-end malware detection analyzes raw bytes of programs with deep neural networks. It is considered as a new promising approach to simplify feature selection in static analysis but still provide accurate detection. Unfortunately, recent studies show that evasion attacks can modify raw bytes of malware and force a well-trained detector to predict the crafted malware as benign. In this paper, we propose a new evasion attack and validate the vulnerability of end-to-end malware detection in the context of multiple detectors, where our evasion attack MultiEvasion can defeat two (or even three) classifiers simultaneously without affecting functionalities of malware. This raises emerging concerns to end-to-end malware detection as running multiple classifiers was considered as one of the major countermeasures against evasion attacks. Specifically, our experimental results over real-world datasets show that our proposed attack can achieve 99.5% evasion rate against two classifiers and 18.3% evasion rate against three classifiers. Our findings suggest that the security of end-to-end malware detection need to be carefully examined before being applied in the real world.
引用
收藏
页码:10 / 18
页数:9
相关论文
共 50 条
  • [31] Adversarial Feature Selection Against Evasion Attacks
    Zhang, Fei
    Chan, Patrick P. K.
    Biggio, Battista
    Yeung, Daniel S.
    Roli, Fabio
    IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (03) : 766 - 777
  • [32] Optimal Defense Strategy against Evasion Attacks
    Wu, Jiachen
    Li, Jipeng
    Wang, Yan
    Zhang, Yanru
    Zhou, Yingjie
    2020 16TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2020), 2020, : 323 - 329
  • [33] Secure Kernel Machines against Evasion Attacks
    Russu, Paolo
    Demontis, Ambra
    Biggio, Battista
    Fumera, Giorgio
    Roli, Fabio
    AISEC'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, 2016, : 59 - 69
  • [34] Securing ML-based Android Malware Detectors: A Defensive Feature Selection Approach against Backdoor Attacks
    Marek, Bartlomiej
    Pieniazek, Kacper
    Ratajczak, Filip
    Adamczyk, Wojciech
    Bok, Bartosz
    Krzyszton, Mateusz
    2024 IEEE 24TH INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING WORKSHOPS, CCGRIDW 2024, 2024, : 128 - 135
  • [35] ND-HMDs: Non-Differentiable Hardware Malware Detectors against Evasive Transient Execution Attacks
    Islam, Md Shohidul
    Kuruvila, Abraham Peedikayil
    Basu, Kanad
    Khasawneh, Khaled N.
    2020 IEEE 38TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2020), 2020, : 537 - 544
  • [36] Binary Black-Box Attacks Against Static Malware Detectors with Reinforcement Learning in Discrete Action Spaces
    Ebrahimi, Mohammadreza
    Pacheco, Jason
    Li, Weifeng
    Hu, James Lee
    Chen, Hsinchun
    2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2021), 2021, : 85 - 91
  • [37] Are Malware Detection Models Adversarial Robust Against Evasion Attack?
    Rathore, Hemant
    Samavedhi, Adithya
    Sahay, Sanjay K.
    Sewak, Mohit
    IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2022,
  • [38] AI@nti-Malware: An intelligent framework for defending against malware attacks
    Ma, Yi-Wei
    Chen, Jiann-Liang
    Kuo, Wen-Han
    Chen, Yu-Chen
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 65
  • [39] Using Infection Markers as a Vaccine against Malware Attacks
    Wichmann, Andre
    Gerhards-Padilla, Elmar
    2012 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS, CONFERENCE ON INTERNET OF THINGS, AND CONFERENCE ON CYBER, PHYSICAL AND SOCIAL COMPUTING (GREENCOM 2012), 2012, : 737 - 742
  • [40] A Defensive Strategy Against Android Adversarial Malware Attacks
    Atedjio, Fabrice Setephin
    Lienou, Jean-Pierre
    Nelson, Frederica F.
    Shetty, Sachin S.
    Kamhoua, Charles A.
    IEEE ACCESS, 2024, 12 : 169432 - 169441