Effectiveness of Adversarial Examples and Defenses for Malware Classification

09/10/2019
by   Robert Podschwadt, et al.
0

Artificial neural networks have been successfully used for many different classification tasks including malware detection and distinguishing between malicious and non-malicious programs. Although artificial neural networks perform very well on these tasks, they are also vulnerable to adversarial examples. An adversarial example is a sample that has minor modifications made to it so that the neural network misclassifies it. Many techniques have been proposed, both for crafting adversarial examples and for hardening neural networks against them. Most previous work has been done in the image domain. Some of the attacks have been adopted to work in the malware domain which typically deals with binary feature vectors. In order to better understand the space of adversarial examples in malware classification, we study different approaches of crafting adversarial examples and defense techniques in the malware domain and compare their effectiveness on multiple datasets.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/09/2019

Short Paper: Creating Adversarial Malware Examples using Code Insertion

There has been an increased interest in the application of convolutional...
research
01/09/2018

Adversarial Deep Learning for Robust Detection of Binary Encoded Malware

Malware is constantly adapting in order to avoid detection. Model based ...
research
09/14/2023

Unleashing the Adversarial Facet of Software Debloating

Software debloating techniques are applied to craft a specialized versio...
research
02/13/2018

Adversarial Examples on Discrete Sequences for Beating Whole-Binary Malware Detection

In recent years, deep learning has shown performance breakthroughs in ma...
research
01/15/2021

Identifying Authorship Style in Malicious Binaries: Techniques, Challenges Datasets

Attributing a piece of malware to its creator typically requires threat ...
research
10/27/2017

Adversarial Detection of Flash Malware: Limitations and Open Issues

During the past two years, Flash malware has become one of the most insi...
research
03/26/2018

Clipping free attacks against artificial neural networks

During the last years, a remarkable breakthrough has been made in AI dom...

Please sign up or login with your details

Forgot password? Click here to reset