On deceiving malware classification with section injection

We investigate how to modify executable files to deceive malware classification systems. This work's main contribution is a methodology to inject bytes across a malware file randomly and use it both as an attack to decrease classification accuracy but also as a defensive method, augmenting the data available for training. It respects the operating system file format to make sure the malware will still execute after our injection and will not change its behavior. We reproduced five state-of-the-art malware classification approaches to evaluate our injection scheme: one based on GIST+KNN, three CNN variations and one Gated CNN. We performed our experiments on a public dataset with 9,339 malware samples from 25 different families. Our results show that a mere increase of 7 40 classification system may not be as trustworthy as initially reported in the literature. We also evaluate using modified malwares alongside the original ones to increase networks robustness against mentioned attacks. Results show that a combination of reordering malware sections and injecting random data can improve overall performance of the classification. Code available at https://github.com/adeilsonsilva/malware-injection.

READ FULL TEXT

page 4

page 8

research
09/20/2019

COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection

Despite many attempts, the state-of-the-art of adversarial machine learn...
research
09/26/2018

Classification of malware based on file content and characteristics

In general, the industry of malware has come to be a market which brings...
research
04/10/2018

Monotonic models for real-time dynamic malware detection

In dynamic malware analysis, programs are classified as malware or benig...
research
10/02/2021

Intensive Image Malware Analysis and Least Significant Bit Matching Steganalysis

Malware as defined by Kaspersky Labs is a type of computer program desig...
research
11/25/2018

Poisoning Behavioral Malware Clustering

Clustering algorithms have become a popular tool in computer security to...
research
05/31/2023

Bytes Are All You Need: Transformers Operating Directly On File Bytes

Modern deep learning approaches usually transform inputs into a modality...
research
09/06/2020

Automatic Yara Rule Generation Using Biclustering

Yara rules are a ubiquitous tool among cybersecurity practitioners and a...

Please sign up or login with your details

Forgot password? Click here to reset