Annual Computer Security Applications Conference 2020
DOI: 10.1145/3427228.3427230
|View full text |Cite
|
Sign up to set email alerts
|

Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 35 publications
(15 citation statements)
references
References 18 publications
0
14
0
Order By: Relevance
“…Following GADGET, Rosenberg et al [109] subsequently propose and implement a end-to-end adversarial attack framework, namely BADGER, which is consists of a series of query-efficient black-box attacks to misclassify such API call sequence-based malware detector as well as minimize the number of queries. Basically, to preserve the original functionality, the proposed attacks are limited to only inserting API calls with no effect or an irrelevant effect, e.g., opening a non-existent file.…”
Section: 21mentioning
confidence: 99%
“…Following GADGET, Rosenberg et al [109] subsequently propose and implement a end-to-end adversarial attack framework, namely BADGER, which is consists of a series of query-efficient black-box attacks to misclassify such API call sequence-based malware detector as well as minimize the number of queries. Basically, to preserve the original functionality, the proposed attacks are limited to only inserting API calls with no effect or an irrelevant effect, e.g., opening a non-existent file.…”
Section: 21mentioning
confidence: 99%
“…Demetrio et al [82] generated adversarial Windows malware by making small manipulation in the file header of Windows malware samples to mislead MalConv [83], which is a DNNs-based windows malware detector. Rosenberg et al [84] presented a black-box attack to mislead API-based malware classifiers by perturbing API sequences of malware samples through an evolutionary algorithm. Kolosnjaji et al [85] proposed a gradient-based attack to generate adversarial malware binaries by manipulating malware binaries through appending padding bytes at the end of malware binary files.…”
Section: Adversarial Examples In Malware Detectionmentioning
confidence: 99%
“…Recently, Rosenberg et al [41] presented a black-box variant of the attack in [37], by creating a substitute model and attacking it using a similar method, and extended it to hybrid classifiers combining static and dynamic features and architectures. Rosenberg et al [40] further presented both black-box and white-box query-efficient attacks based on perturbations generated using a GAN that was trained on benign samples.…”
Section: A Rnn Adversarial Examplesmentioning
confidence: 99%
“…We assume an adversary with full access to a trained target model, with unlimited number of possible queries, so query efficient attack (e.g., [40]) is not an issue. However, the adversary has no ability to influence that model.…”
Section: A Threat Modelmentioning
confidence: 99%
See 1 more Smart Citation