Anti-Malware Sandbox Games

02/28/2022
by   Sujoy Sikdar, et al.
0

We develop a game theoretic model of malware protection using the state-of-the-art sandbox method, to characterize and compute optimal defense strategies for anti-malware. We model the strategic interaction between developers of malware (M) and anti-malware (AM) as a two player game, where AM commits to a strategy of generating sandbox environments, and M responds by choosing to either attack or hide malicious activity based on the environment it senses. We characterize the condition for AM to protect all its machines, and identify conditions under which an optimal AM strategy can be computed efficiently. For other cases, we provide a quadratically constrained quadratic program (QCQP)-based optimization framework to compute the optimal AM strategy. In addition, we identify a natural and easy to compute strategy for AM, which as we show empirically, achieves AM utility that is close to the optimal AM utility, in equilibrium.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/04/2023

Review of Deep Learning-based Malware Detection for Android and Windows System

Differentiating malware is important to determine their behaviors and le...
research
08/26/2019

Modeling infection methods of computer malware in the presence of vaccinations using epidemiological models: An analysis of real-world data

Computer malware and biological pathogens often use similar mechanisms o...
research
01/21/2021

Malware Detection and Analysis: Challenges and Research Opportunities

Malwares are continuously growing in sophistication and numbers. Over th...
research
01/17/2019

Easy to Fool? Testing the Anti-evasion Capabilities of PDF Malware Scanners

Malware scanners try to protect users from opening malicious documents b...
research
07/19/2018

Emulating malware authors for proactive protection using GANs over a distributed image visualization of dynamic file behavior

Malware authors have always been at an advantage of being able to advers...
research
07/19/2018

Emulating malware authors for proactive protection using GANs over a distributed image visualization of the dynamic file behavior

Malware authors have always been at an advantage of being able to advers...
research
10/31/2018

Improving ICS Cyber Resilience through Optimal Diversification of Network Resources

Network diversity has been widely recognized as an effective defense str...

Please sign up or login with your details

Forgot password? Click here to reset