Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries

01/11/2019
by   Luca Demetrio, et al.
0

Recent work has shown that deep-learning algorithms for malware detection are also susceptible to adversarial examples, i.e., carefully-crafted perturbations to input malware that enable misleading classification. Although this has questioned their suitability for this task, it is not yet clear why such algorithms are easily fooled also in this particular application domain. In this work, we take a first step to tackle this issue by leveraging explainable machine-learning algorithms developed to interpret the black-box decisions of deep neural networks. In particular, we use an explainable technique known as feature attribution to identify the most influential input features contributing to each decision, and adapt it to provide meaningful explanations to the classification of malware binaries. In this case, we find that a recently-proposed convolutional neural network does not learn any meaningful characteristic for malware detection from the data and text sections of executable files, but rather tends to learn to discriminate between benign and malware samples based on the characteristics found in the file header. Based on this finding, we propose a novel attack algorithm that generates adversarial malware binaries by only changing few tens of bytes in the file header. With respect to the other state-of-the-art attack algorithms, our attack does not require injecting any padding bytes at the end of the file, and it is much more efficient, as it requires manipulating much fewer bytes.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/12/2018

Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables

Machine-learning methods have already been exploited as useful tools for...
research
03/09/2018

Explaining Black-box Android Malware Detection

Machine-learning models have been recently used for detecting malicious ...
research
04/09/2019

Short Paper: Creating Adversarial Malware Examples using Code Insertion

There has been an increased interest in the application of convolutional...
research
03/09/2018

Malytics: A Malware Detection Scheme

An important problem of cyber-security is malware analysis. Besides good...
research
11/30/2019

End-to-End Deep Neural Networks and Transfer Learning for Automatic Analysis of Nation-State Malware

Malware allegedly developed by nation-states, also known as advanced per...
research
11/27/2017

DeepAPT: Nation-State APT Attribution Using End-to-End Deep Neural Networks

In recent years numerous advanced malware, aka advanced persistent threa...
research
07/31/2020

Identifying meaningful clusters in malware data

Finding meaningful clusters in drive-by-download malware data is a parti...

Please sign up or login with your details

Forgot password? Click here to reset