Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning

01/26/2018
by   Hyrum S. Anderson, et al.
0

Machine learning is a popular approach to signatureless malware detection because it can generalize to never-before-seen malware families and polymorphic strains. This has resulted in its practical use for either primary detection engines or for supplementary heuristic detection by anti-malware vendors. Recent work in adversarial machine learning has shown that deep learning models are susceptible to gradient-based attacks, whereas non-differentiable models that report a score can be attacked by genetic algorithms that aim to systematically reduce the score. We propose a more general framework based on reinforcement learning (RL) for attacking static portable executable (PE) anti-malware engines. The general framework does not require a differentiable model nor does it require the engine to produce a score. Instead, an RL agent is equipped with a set of functionality-preserving operations that it may perform on the PE file. Through a series of games played against the anti-malware engine, it learns which sequences of operations are likely to result in evading the detector for any given malware sample. This enables completely black-box attacks against static PE anti-malware, and produces functional evasive malware samples as a direct result. We show in experiments that our method can attack a gradient-boosted machine learning model with evasion rates that are substantial and appear to be strongly dependent on the dataset. We demonstrate that attacks against this model appear to also evade components of publicly hosted antivirus engines. Adversarial training results are also presented: by retraining the model on evasive ransomware samples, a subsequent attack is 33 to allow researchers to study evasion rates against their own machine learning models, malware samples, and their own RL agents.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/16/2023

Query-Free Evasion Attacks Against Machine Learning-Based Malware Detectors with Generative Adversarial Networks

Malware detectors based on machine learning (ML) have been shown to be s...
research
06/23/2023

Creating Valid Adversarial Examples of Malware

Machine learning is becoming increasingly popular as a go-to approach fo...
research
06/14/2019

Antiforensic techniques deployed by custom developed malware in evading anti-virus detection

Both malware and antivirus detection tools advance in their capabilities...
research
08/17/2020

Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection

Recent work has shown that adversarial Windows malware samples - also re...
research
03/24/2022

MERLIN – Malware Evasion with Reinforcement LearnINg

In addition to signature-based and heuristics-based detection techniques...
research
11/18/2021

Enhancing the Insertion of NOP Instructions to Obfuscate Malware via Deep Reinforcement Learning

Current state-of-the-art research for tackling the problem of malware de...
research
12/19/2019

Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection

Motivated by the transformative impact of deep neural networks (DNNs) on...

Please sign up or login with your details

Forgot password? Click here to reset