2022
DOI: 10.1007/978-981-19-8991-9_29
|View full text |Cite
|
Sign up to set email alerts
|

Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
40
0
2

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 80 publications
(42 citation statements)
references
References 6 publications
0
40
0
2
Order By: Relevance
“…However, these techniques are ineffective for higher-level representations such as those based on API calls. For this purpose, many works insert additional API calls in feature space to add noise in the representation and evade the detection systems [170][171][172][173][174][175][176]. In other works, reinforcement learning (RL) is leveraged to manipulate the original malware in order to evade detection while maintaining a correct format and semantic [177][178][179].…”
Section: Adversarial Attacks and Malware Detectionmentioning
confidence: 99%
“…However, these techniques are ineffective for higher-level representations such as those based on API calls. For this purpose, many works insert additional API calls in feature space to add noise in the representation and evade the detection systems [170][171][172][173][174][175][176]. In other works, reinforcement learning (RL) is leveraged to manipulate the original malware in order to evade detection while maintaining a correct format and semantic [177][178][179].…”
Section: Adversarial Attacks and Malware Detectionmentioning
confidence: 99%
“…The idea of generating fake features for obfuscation and adversarial attacks on malware systems is not new. For example, Hu et al [22] and Kawai et al [27] proposed MalGAN to bypass black-box machine learning based detection models. MalGAN uses the output of a black-box model and employs GAN to generate fake samples.…”
Section: Related Workmentioning
confidence: 99%
“…StyleGAN was also used to create the trending website "thispersondoesnotexist.com". MalGAN is a GAN technique that was designed specifically to deal with malware images [22,27]. In this paper, we consider the utility of GANs for adversarial attacks on image-based malware systems.…”
Section: Introductionmentioning
confidence: 99%
“…The featurespace of Windows payload files is not fixed and can take various forms of feature engineering. This characteristic almost makes the payload feature-space impracticable to discover an approximate or exact function that is differentiable [8][9][10][11][12][13]. Initial observations from literature [5,8,9,[12][13][14][15][16], point out that code transformation actions such as; appending semantic nop no instructions, insertion of jump instructions and replace existing instructions, when applied on a software or an execuatble file can obfuscate the file against pirating or lower the file's true positive rate.…”
Section: Introductionmentioning
confidence: 99%
“…This characteristic almost makes the payload feature-space impracticable to discover an approximate or exact function that is differentiable [8][9][10][11][12][13]. Initial observations from literature [5,8,9,[12][13][14][15][16], point out that code transformation actions such as; appending semantic nop no instructions, insertion of jump instructions and replace existing instructions, when applied on a software or an execuatble file can obfuscate the file against pirating or lower the file's true positive rate. In this work, we enhanced these aforementioned code transformation actions with Dynamic Programming based search method-a reinforcement learning algorithm, to increase their evasive potency against static malware scanners whiles satisfying the behavior preserving criteria.…”
Section: Introductionmentioning
confidence: 99%