Towards Robust Detection of Adversarial Infection Vectors: Lessons Learned in PDF Malware

11/02/2018
by   Davide Maiorca, et al.
0

Malware still constitutes a major threat in the cybersecurity landscape, also due to the widespread use of infection vectors such as documents and other media formats. These infection vectors hide embedded malicious code to the victim users, thus facilitating the use of social engineering techniques to infect their machines. In the last decade, machine-learning algorithms provided an effective defense against such threats, being able to detect malware embedded in various infection vectors. However, the existence of an arms race in an adversarial setting like that of malware detection has recently questioned their appropriateness for this task. In this work, we focus on malware embedded in PDF files, as a representative case of how such an arms race can evolve. We first provide a comprehensive taxonomy of PDF malware attacks, and of the various learning-based detection systems that have been proposed to detect them. Then, we discuss more sophisticated attack algorithms that craft evasive PDF malware oriented to bypass such systems. We describe state-of-the-art mitigation techniques, highlighting that designing robust machine-learning algorithms remains a challenging open problem. We conclude the paper by providing a set of guidelines for designing more secure systems against the threat of adversarial malicious PDF files.

READ FULL TEXT
research
12/12/2022

Machine Learning for Detecting Malware in PE Files

The increasing number of sophisticated malware poses a major cybersecuri...
research
07/27/2021

PDF-Malware: An Overview on Threats, Detection and Evasion Attacks

In the recent years, Portable Document Format, commonly known as PDF, ha...
research
10/11/2018

USBCaptchaIn: Preventing (Un)Conventional Attacks from Promiscuously Used USB Devices in Industrial Control Systems

Industrial Control Systems (ICS) are sensible targets for high profile a...
research
04/23/2019

PowerDrive: Accurate De-Obfuscation and Analysis of PowerShell Malware

PowerShell is nowadays a widely-used technology to administrate and mana...
research
10/27/2017

Adversarial Detection of Flash Malware: Limitations and Open Issues

During the past two years, Flash malware has become one of the most insi...
research
07/27/2018

A Cyber Kill Chain Based Taxonomy of Banking Trojans for Evolutionary Computational Intelligence

Malware such as banking Trojans are popular with financially-motivated c...
research
02/03/2021

All Infections are Not Created Equal: Time-Sensitive Prediction of Malware Generated Network Attacks

Many techniques have been proposed for quickly detecting and containing ...

Please sign up or login with your details

Forgot password? Click here to reset