2021
DOI: 10.1109/tai.2021.3103139
|View full text |Cite
|
Sign up to set email alerts
|

Learn2Evade: Learning-Based Generative Model for Evading PDF Malware Classifiers

Abstract: Recent research has shown that a small perturbation to an input may forcibly change the prediction of a machine learning (ML) model. Such variants are commonly referred to as adversarial examples. Early studies have focused mostly on ML models for image processing and expanded to other applications, including those for malware classification. In this paper, we focus on the problem of finding adversarial examples against ML-based PDF malware classifiers. We deem that our problem is more challenging than those a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 22 publications
0
6
0
Order By: Relevance
“…Set loss function using equation (4) (17) end for (18) Exert Adam optimizer to optimize parameter Q (19) end if (20) Every U step reset θ − � θ (21) if done then (22) break (23) end if (24) end for (25) if episode mod TEST_INTERVAL �� 0 then (26) Run Testing Algorithm and record evasion rate ER (27) Store Q and Q * to a new model M (28) end if (29) end for ALGORITHM 1: Training algorithm.…”
Section: Experiments A: Performance Analysis For Policy Improvement T...mentioning
confidence: 99%
See 2 more Smart Citations
“…Set loss function using equation (4) (17) end for (18) Exert Adam optimizer to optimize parameter Q (19) end if (20) Every U step reset θ − � θ (21) if done then (22) break (23) end if (24) end for (25) if episode mod TEST_INTERVAL �� 0 then (26) Run Testing Algorithm and record evasion rate ER (27) Store Q and Q * to a new model M (28) end if (29) end for ALGORITHM 1: Training algorithm.…”
Section: Experiments A: Performance Analysis For Policy Improvement T...mentioning
confidence: 99%
“…Dang et al [19] presented a method named EvadeHC using the mountain climbing algorithm, which was claimed to be more time-efficient while preserving a high evasion rate. Recent studies done by Bae et al [20] and Li et al [21] applied generative adversarial network (GAN) to bypass detectors and achieved better performance than previous techniques.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Similar methods that utilize Learning-Based Generative Model for PDF files [16], Concept Drift Detection with Sequential Deep Learning (CDS SDL) for batch malwares [17], Fuzzified Features with Boosted Fuzzy Random Forest (FBRF) [18], and RNN for visualization of malwares [19] are discussed by researchers. These models aim at improving inter-class feature variance via rigorous analysis of extracted features in order to identify malwarespecific models that can be deployed for on-field use cases.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In the last few years, several attempts have been made to develop a classifier with the malware feature. Data mining and ML methods are utilized for developing smart malware classification and detection techniques [9]. The Deep neural network (DNN) has attained considerable achievement in various applications, particularly in computer vision.…”
Section: Introductionmentioning
confidence: 99%