Feature-level Malware Obfuscation in Deep Learning

02/10/2020
by   Keith Dillon, et al.
0

We consider the problem of detecting malware with deep learning models, where the malware may be combined with significant amounts of benign code. Examples of this include piggybacking and trojan horse attacks on a system, where malicious behavior is hidden within a useful application. Such added flexibility in augmenting the malware enables significantly more code obfuscation. Hence we focus on the use of static features, particularly Intents, Permissions, and API calls, which we presume cannot be ultimately hidden from the Android system, but only augmented with yet more such features. We first train a deep neural network classifier for malware classification using features of benign and malware samples. Then we demonstrate a steep increase in false negative rate (i.e., attacks succeed), simply by randomly adding features of a benign app to malware. Finally we test the use of data augmentation to harden the classifier against such attacks. We find that for API calls, it is possible to reject the vast majority of attacks, where using Intents or Permissions is less successful.

READ FULL TEXT

page 3

page 4

research
08/12/2022

Analysis, Detection, and Classification of Android Malware using System Calls

With the increasing popularity of Android in the last decade, Android is...
research
08/08/2023

DroidDissector: A Static and Dynamic Analysis Tool for Android Malware Detection

DroidDissector is an extraction tool for both static and dynamic feature...
research
10/09/2019

An MDL-Based Classifier for Transactional Datasets with Application in Malware Detection

We design a classifier for transactional datasets with application in ma...
research
01/08/2018

HeNet: A Deep Learning Approach on Intel^ Processor Trace for Effective Exploit Detection

This paper presents HeNet, a hierarchical ensemble neural network, appli...
research
07/17/2019

Dynamic Malware Analysis with Feature Engineering and Feature Learning

Dynamic malware analysis executes the program in an isolated environment...
research
08/24/2019

Precise system-wide concatic malware unpacking

Run time packing is a common approach malware use to obfuscate their pay...
research
09/12/2021

DRo: A data-scarce mechanism to revolutionize the performance of Deep Learning based Security Systems

Supervised Deep Learning requires plenty of labeled data to converge, an...

Please sign up or login with your details

Forgot password? Click here to reset