A Comparison of State-of-the-Art Techniques for Generating Adversarial Malware Binaries

11/22/2021
by   Prithviraj Dasgupta, et al.
0

We consider the problem of generating adversarial malware by a cyber-attacker where the attacker's task is to strategically modify certain bytes within existing binary malware files, so that the modified files are able to evade a malware detector such as machine learning-based malware classifier. We have evaluated three recent adversarial malware generation techniques using binary malware samples drawn from a single, publicly available malware data set and compared their performances for evading a machine-learning based malware classifier called MalConv. Our results show that among the compared techniques, the most effective technique is the one that strategically modifies bytes in a binary's header. We conclude by discussing the lessons learned and future research directions on the topic of adversarial malware generation.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/12/2022

Machine Learning for Detecting Malware in PE Files

The increasing number of sophisticated malware poses a major cybersecuri...
research
10/30/2020

Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers

The performance of a machine learning-based malware classifier depends o...
research
03/07/2021

On Ensemble Learning

In this paper, we consider ensemble classifiers, that is, machine learni...
research
12/31/2022

Knowledge-Based Dataset for Training PE Malware Detection Models

Ontologies are a standard for semantic schemata in many knowledge-intens...
research
09/21/2019

Dynamic data fusion using multi-input models for malware classification

Criminals use malware to disrupt cyber-systems. The number of these malw...
research
10/29/2021

A Comprehensive Study on Learning-Based PE Malware Family Classification Methods

Driven by the high profit, Portable Executable (PE) malware has been con...
research
12/10/2017

Improving Malware Detection Accuracy by Extracting Icon Information

Detecting PE malware files is now commonly approached using statistical ...

Please sign up or login with your details

Forgot password? Click here to reset