4.7 Article

Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2021.3082330

关键词

Adversarial examples; malware detection; evasion attacks; black-box optimization; machine learning

资金

  1. Progetti di Rilevante Interesse Nazionale (PRIN) 2017 Project RexLearn through the Italian Ministry of Education, University and Research [2017TWNMH2]

向作者/读者索取更多资源

This paper introduces a novel family of black-box attacks that are both query-efficient and functionality-preserving, by injecting benign content into malicious files. Empirical investigation shows that these black-box attacks can bypass popular static Windows malware detectors with few queries and small payloads, even when they only return predicted labels. Surprisingly, the attacks can also evade more than 12 commercial antivirus engines on average.
Windows malware detectors based on machine learning are vulnerable to adversarial examples, even if the attacker is only given black-box query access to the model. The main drawback of these attacks is that: (i) they are query-inefficient, as they rely on iteratively applying random transformations to the input malware; and (ii) they may also require executing the adversarial malware in a sandbox at each iteration of the optimization process, to ensure that its intrusive functionality is preserved. In this paper, we overcome these issues by presenting a novel family of black-box attacks that are both query-efficient and functionality-preserving, as they rely on the injection of benign content (which will never be executed) either at the end of the malicious file, or within some newly-created sections. Our attacks are formalized as a constrained minimization problem which also enables optimizing the trade-off between the probability of evading detection and the size of the injected payload. We empirically investigate this trade-off on two popular static Windows malware detectors, and show that our black-box attacks can bypass them with only few queries and small payloads, even when they only return the predicted labels. We also evaluate whether our attacks transfer to other commercial antivirus solutions, and surprisingly find that they can evade, on average, more than 12 commercial antivirus engines. We conclude by discussing the limitations of our approach, and its passible future extensions to target malware classifiers based on dynamic analysis.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据