2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International 2019
DOI: 10.1109/trustcom/bigdatase.2019.00040
|View full text |Cite
|
Sign up to set email alerts
|

AIMED: Evolving Malware with Genetic Programming to Evade Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(22 citation statements)
references
References 16 publications
0
19
0
Order By: Relevance
“…The generated adversarial files are not checked if they are valid, therefore some files can be corrupt. [14] uses the same set of operations as [25] combined with Genetic Algorithm to generate adversarial Windows PE files. In the The gadgets are then implanted on the malicious file.…”
Section: B Problem Space Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…The generated adversarial files are not checked if they are valid, therefore some files can be corrupt. [14] uses the same set of operations as [25] combined with Genetic Algorithm to generate adversarial Windows PE files. In the The gadgets are then implanted on the malicious file.…”
Section: B Problem Space Attacksmentioning
confidence: 99%
“…A positive answer would enable model hardening at affordable computational cost and without developing specific attacks that work in the particular subject domain. We study this question through an empirical study that spans over three domains where realistic attacks exist: text classification where a problem-space attack (TextFooler [12]) replaces words in a sentence with their synonyms; botnet traffic detection where a constrained feature space attack (FENCE [13]) applies realistic modifications to network traffic features; and malware classification where a problem-space attack (AIMED [14]) modifies malware PE files. For each of these three domains, we generate examples using unrealistic attacks that are either domain-specific (e.g.…”
Section: Introductionmentioning
confidence: 99%
“…By contrast, the deep convolutional net proposed by Johns and Coull et al [5] enforces spatial locality among features, which means both the location and magnitude of adversarial noise play a role in the success of evasion attacks. Even the GBDT model has been shown to be vulnerable to evasion attacks [4,8,22], albeit it with more advanced and computationally-intensive attacks. While each of these models has been previously been evaluated in an ad-hoc manner, we are the first to treat attacks on machine-learning models in a holistic manner using a single unifying framework, and in doing so we uncover two new attack methods that apply to both MalConv and the Coull et al 's model despite the unique architectural differences between the two.…”
Section: Gradient Boosting Decision Tree (Gbdt)mentioning
confidence: 99%
“…Since the attacker want to produce space for injecting the adversarial payload, they can alter the representation to their advantage by shifting content within the bounds of the specification. This is not the first work exploring the space of practical manipulations applicable to the Windows PE format [2,4,7,8,13,16,[22][23][24], and we will focus on manipulations that have not yet been proposed. In particular, these transformations can be used to create space inside the input binary, and hide all the malicious code from the target network, thereby making them more difficult to discover and remove, while also increasing the number of adversarial bytes that can be injected.…”
Section: Practical Manipulationsmentioning
confidence: 99%
“…When tested with the actual AV classifier, the modified binary's evasiveness was reported to decrease to 9%. Similar approaches of modifying the binary, albeit using genetic algorithms such as AIMED [9] and FUMVar [26] have also been proposed. In [30], authors propose three types of adversarial attacks that are again based on genetic algorithms for intelligently modifying a PE malware binary's opcodes, API calls and system calls.…”
Section: Introductionmentioning
confidence: 99%