Adversarial Robustness of Deep Learning-Based Malware Detectors via (De)Randomized Smoothing

被引:2
作者
Gibert, Daniel [1 ]
Zizzo, Giulio [2 ]
Le, Quan [1 ]
Planes, Jordi [3 ]
机构
[1] Univ Coll Dublin, CeADAR, Dublin D04 V2N9, Ireland
[2] IBM Res Europe, Dublin D15 HN66, Ireland
[3] Univ Lleida, Dept Comp Engn & Digital Design, Lleida, Spain
基金
欧盟地平线“2020”;
关键词
Adversarial defense; (de)randomized smoothing; evasion attacks; machine learning; malware detection;
D O I
10.1109/ACCESS.2024.3392391
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning-based malware detectors have been shown to be susceptible to adversarial malware examples, i.e. malware examples that have been deliberately manipulated in order to avoid detection. In light of the vulnerability of deep learning detectors to subtle input file modifications, we propose a practical defense against adversarial malware examples inspired by (de)randomized smoothing. In this work, we reduce the chances of sampling adversarial content injected by malware authors by selecting correlated subsets of bytes, rather than using Gaussian noise to randomize inputs like in the Computer Vision domain. During training, our chunk-based smoothing scheme trains a base classifier to make classifications on a subset of contiguous bytes or chunk of bytes. At test time, a large number of chunks are then classified by a base classifier and the consensus among these classifications is then reported as the final prediction. We propose two strategies to determine the location of the chunks used for classification: 1) randomly selecting the locations of the chunks and 2) selecting contiguous adjacent chunks. To showcase the effectiveness of our approach, we have trained two classifiers with our chunk-based smoothing schemes on the BODMAS dataset. Our findings reveal that the chunk-based smoothing classifiers exhibit greater resilience against adversarial malware examples generated with state-of-the-art evasion attacks, outperforming a non-smoothed classifier and a randomized smoothing-based classifier by a great margin.
引用
收藏
页码:61152 / 61162
页数:11
相关论文
共 26 条
[11]   Fusing feature engineering and deep learning: A case study for malware classification [J].
Gibert, Daniel ;
Planes, Jordi ;
Mateu, Carles ;
Le, Quan .
EXPERT SYSTEMS WITH APPLICATIONS, 2022, 207
[12]  
Gibert G., 2023, COMPUT SECURITY ESOR, P683
[13]  
Goodfellow IJ, 2015, Arxiv, DOI arXiv:1412.6572
[14]  
Kolosnjaji B, 2018, EUR SIGNAL PR CONF, P533, DOI 10.23919/EUSIPCO.2018.8553214
[15]  
Krcal O., 2018, 6THINT C LEARN REPRE, P1
[16]  
Kreuk F, 2019, Arxiv, DOI arXiv:1802.04528
[17]  
Levine S., 2020, Adv. Neural Inf. Process. Syst., P1
[18]  
Lucas K, 2023, PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, P1163
[19]   Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes [J].
Lucas, Keane ;
Sharif, Mahmood ;
Bauer, Lujo ;
Reiter, Michael K. ;
Shintre, Saurabh .
ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, :744-758
[20]  
Paszke A, 2019, ADV NEUR IN, V32