Combining Generators of Adversarial Malware Examples to Increase Evasion Rate

04/14/2023
by   Matouš Kozák, et al.
0

Antivirus developers are increasingly embracing machine learning as a key component of malware defense. While machine learning achieves cutting-edge outcomes in many fields, it also has weaknesses that are exploited by several adversarial attack techniques. Many authors have presented both white-box and black-box generators of adversarial malware examples capable of bypassing malware detectors with varying success. We propose to combine contemporary generators in order to increase their potential. Combining different generators can create more sophisticated adversarial examples that are more likely to evade anti-malware tools. We demonstrated this technique on five well-known generators and recorded promising results. The best-performing combination of AMG-random and MAB-Malware generators achieved an average evasion rate of 15.9 against top-tier antivirus products. This represents an average improvement of more than 36 generators, respectively. The generator that benefited the most from having another generator follow its procedure was the FGSM injection attack, which improved the evasion rate on average between 91.97 the second generator used. These results demonstrate that combining different generators can significantly improve their effectiveness against leading antivirus programs.

READ FULL TEXT

page 6

page 7

research
06/23/2023

Creating Valid Adversarial Examples of Malware

Machine learning is becoming increasingly popular as a go-to approach fo...
research
08/19/2023

A Comparison of Adversarial Learning Techniques for Malware Detection

Machine learning has proven to be a useful tool for automated malware de...
research
12/03/2021

Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach

Deep Learning (DL)-based malware detectors are increasingly adopted for ...
research
04/20/2019

Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach

The widespread adoption of smartphones dramatically increases the risk o...
research
09/14/2023

Unleashing the Adversarial Facet of Software Debloating

Software debloating techniques are applied to craft a specialized versio...
research
03/15/2023

Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information

The function call graph (FCG) based Android malware detection methods ha...
research
03/01/2018

The Shape of Alerts: Detecting Malware Using Distributed Detectors by Robustly Amplifying Transient Correlations

We introduce a new malware detector - Shape-GD - that aggregates per-mac...

Please sign up or login with your details

Forgot password? Click here to reset