The Naked Sun: Malicious Cooperation Between Benign-Looking Processes

11/06/2019
by   Fabio De Gaspari, et al.
0

Recent progress in machine learning has generated promising results in behavioral malware detection. Behavioral modeling identifies malicious processes via features derived by their runtime behavior. Behavioral features hold great promise as they are intrinsically related to the functioning of each malware, and are therefore considered difficult to evade. Indeed, while a significant amount of results exists on evasion of static malware features, evasion of dynamic features has seen limited work. This paper thoroughly examines the robustness of behavioral malware detectors to evasion, focusing particularly on anti-ransomware evasion. We choose ransomware as its behavior tends to differ significantly from that of benign processes, making it a low-hanging fruit for behavioral detection (and a difficult candidate for evasion). Our analysis identifies a set of novel attacks that distribute the overall malware workload across a small set of cooperating processes to avoid the generation of significant behavioral features. Our most effective attack decreases the accuracy of a state-of-the-art classifier from 98.6 only 18 cooperating processes. Furthermore, we show our attacks to be effective against commercial ransomware detectors even in a black-box setting.

READ FULL TEXT
research
11/19/2018

Behavioral Malware Classification using Convolutional Recurrent Neural Networks

Behavioral malware detection aims to improve on the performance of stati...
research
12/14/2020

Binary Black-box Evasion Attacks Against Deep Learning-based Static Malware Detectors with Adversarial Byte-Level Language Model

Anti-malware engines are the first line of defense against malicious sof...
research
06/23/2021

Learning Explainable Representations of Malware Behavior

We address the problems of identifying malware in network telemetry logs...
research
11/25/2018

Poisoning Behavioral Malware Clustering

Clustering algorithms have become a popular tool in computer security to...
research
01/26/2023

Minerva: A File-Based Ransomware Detector

Ransomware is a rapidly evolving type of malware designed to encrypt use...
research
04/20/2022

Can Voters Detect Errors on Their Printed Ballots? Absolutely

There is still debate on whether voters can detect malicious changes in ...
research
05/04/2020

Mind the Gap: On Bridging the Semantic Gap between Machine Learning and Information Security

Despite the potential of Machine learning (ML) to learn the behavior of ...

Please sign up or login with your details

Forgot password? Click here to reset