2020
DOI: 10.48550/arxiv.2008.07125
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection

Luca Demetrio,
Scott E. Coull,
Battista Biggio
et al.

Abstract: Recent work has shown that adversarial Windows malware samples -also referred to as adversarial EXEmples in this paper -can bypass machine learning-based detection relying on static code analysis by perturbing relatively few input bytes. To preserve malicious functionality, previous attacks either add bytes to existing non-functional areas of the file, potentially limiting their effectiveness, or require running computationally-demanding validation steps to discard malware variants that do not correctly execut… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(13 citation statements)
references
References 14 publications
(58 reference statements)
0
13
0
Order By: Relevance
“…In [37], Demetrio et al propose a general adversarial attack framework (RAMEn) against PE malware detectors based on two novel functionality-preserving manipulations, namely Extend and Shift, which inject adversarial payloads by extending the DOS header and shifting the content of the first section in PE files, respectively. In fact, the adversarial payload generation can be optimized in both white-box and black-box settings.…”
Section: White-box Adversarial Attacks Against Pe Malware Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…In [37], Demetrio et al propose a general adversarial attack framework (RAMEn) against PE malware detectors based on two novel functionality-preserving manipulations, namely Extend and Shift, which inject adversarial payloads by extending the DOS header and shifting the content of the first section in PE files, respectively. In fact, the adversarial payload generation can be optimized in both white-box and black-box settings.…”
Section: White-box Adversarial Attacks Against Pe Malware Detectionmentioning
confidence: 99%
“…To make it more stealthy than previous adversarial attacks [35,37,64], Sharif et al propose a new kind of adversarial attacks based on binary diversification techniques which manipulate the instructions of binaries in a fine-grained function level via two kinds of functionality-preserving transformations, i.e., in-place randomization and code displacement [84,123]. In order to guide the transformations that are applied to the PE malware under the white-box setting, they use a gradient ascent optimization to select the transformation only if it shifts its embeddings in a direction similar to the gradient of the attack loss function [14] with respect to its embeddings.…”
Section: White-box Adversarial Attacks Against Pe Malware Detectionmentioning
confidence: 99%
“…Adversarial examples are carefully crafted samples to fool the ML model. Previous work has already illustrated how a clever attacker can augment the correctly classified malware with malicious components to cause the ML model to misclassify it [15,16,8,28]. These attacks mostly inject malicious components to the non-reachable parts of the malware, such as padding bytes to the end of the malware or injecting malicious payload to the malware's DOS header.…”
Section: Future Directionmentioning
confidence: 99%
“…A prevalent modification strategy in the literature and previous competitions against learning methods is to add unused content in areas that are not relevant for the functionality of a program [e.g. 15,45]. In particular, adversaries exploit the semantic gap, that is, the discrepancy between extracted features and the actual processed part of a PE file [20].…”
Section: A File Modificationmentioning
confidence: 99%
“…In the context of PE files, an adversary can exploit or create unused areas at multiple locations [15]. As Figure 3 highlights, it is possible to enlarge the DOS header, to fill the slack space at the end of each section, or to append bytes to the overlay, i.e., to the end of the PE file.…”
Section: A File Modificationmentioning
confidence: 99%