2021
DOI: 10.48550/arxiv.2111.11487
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Comparison of State-of-the-Art Techniques for Generating Adversarial Malware Binaries

Abstract: We consider the problem of generating adversarial malware by a cyber-attacker where the attacker's task is to strategically modify certain bytes within existing binary malware files, so that the modified files are able to evade a malware detector such as machine learning-based malware classifier. We have evaluated three recent adversarial malware generation techniques using binary malware samples drawn from a single, publicly available malware data set and compared their performances for evading a machine-lear… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 23 publications
(29 reference statements)
0
2
0
Order By: Relevance
“…We chose MalConv, a popular DL-based static malware detection model, which is used as the target model for many malware adversarial attacks [14,15,[30][31][32][33][34][35]. We reproduced the model using the Python programming language.…”
Section: The Experimental Results Of Malware Detectormentioning
confidence: 99%
See 1 more Smart Citation
“…We chose MalConv, a popular DL-based static malware detection model, which is used as the target model for many malware adversarial attacks [14,15,[30][31][32][33][34][35]. We reproduced the model using the Python programming language.…”
Section: The Experimental Results Of Malware Detectormentioning
confidence: 99%
“…The function of this step is to train a mature malware detection model. For the DL-based static malware detector, we choose the MalConv model(as shown in Figure 3), which is not only the current popular malware detection model, but also the target model selected by many malware adversarial attacks [14,15,[30][31][32][33][34][35]. By training the MalConv model, a binary classifier that can distinguish benign samples from malicious samples can be obtained.…”
Section: Our Scheme 41 Training Malware Detectormentioning
confidence: 99%