An Adversarial Attack on ML-Based IoT Malware Detection Using Binary Diversification Techniques

被引:1
作者
Mwangi, Maina Bernard [1 ]
Cheng, Shin-Ming [1 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taipei 10607, Taiwan
关键词
Adversarial attack; binary diversification; Internet of Things (IoT) malware detection; machine learning;
D O I
10.1109/ACCESS.2024.3513713
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The integration of machine learning (ML) has revolutionized malware detection, enabling accurate identification of subtle distinctions between malware and benignware. As the threat landscape continually evolves and new malware strains emerge, conventional signature-based detectors are becoming increasingly inadequate, leading to a growing reliance on ML-based detectors. However, ML-based detection systems are particularly vulnerable to adversarial attacks, where subtle alterations to input samples can deceive detectors into misclassifying malware as benignware, highlighting the need for robustness studies, as such misclassifications can lead to significant damage. To this end, we stage a black-box attack on IoT malware detection systems, specifically targeting structure-based detectors, which are predominant due to their ability to detect malware across diverse CPU architectures in IoT environments. Our strategy employs semantic-preserving binary diversification techniques, including function inlining, branch function insertion, control flow graph flattening, and basic block merging and reordering, to modify malware binaries and evade detection. We train a multi-structural substitute detector (based on a combination of control flow graph and function call graph features) on a large-scale dataset of IoT ELF binaries, achieving detection rates of up to 98.24%. Using explainable AI (XAI), we transfer the attack to four structural target detectors, achieving evasion rates of up to 100% on certain detectors, with an average binary size increase of just 8.35%. The modified samples evade detection by a state-of-the-art adversarial detector and several commercial antivirus engines, highlighting the persistent challenge of defending against adversarial threats and emphasizing the need for enhanced and multi-faceted defense mechanisms.
引用
收藏
页码:185172 / 185186
页数:15
相关论文
共 71 条
[41]   AMAL: High-fidelity, behavior-based automated malware analysis and classification [J].
Mohaisen, Aziz ;
Alrawi, Omar ;
Mohaisen, Manar .
COMPUTERS & SECURITY, 2015, 52 :251-266
[42]   SIM-FED: Secure IoT malware detection model with federated learning [J].
Nobakht, Mehrnoosh ;
Javidan, Reza ;
Pourebrahimi, Alireza .
COMPUTERS & ELECTRICAL ENGINEERING, 2024, 116
[43]   A Novel Machine Learning Approach for Android Malware Detection Based on the Co-Existence of Features [J].
Odat, Esraa ;
Yaseen, Qussai M. .
IEEE ACCESS, 2023, 11 :15471-15484
[44]   MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version) [J].
Onwuzurike, Lucky ;
Mariconti, Enrico ;
Andriotis, Panagiotis ;
De Cristofaro, Emiliano ;
Ross, Gordon ;
Stringhini, Gianluca .
ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2019, 22 (02)
[45]  
Park Daniel, 2019, 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA), P1283, DOI 10.1109/ICMLA.2019.00210
[46]   RMDNet-Deep Learning Paradigms for Effective Malware Detection and Classification [J].
Puneeth, S. ;
Lal, Shyam ;
Pratap Singh, Mahendra ;
Raghavendra, B. S. .
IEEE ACCESS, 2024, 12 :82622-82635
[47]   A survey of IoT malware and detection methods based on static features [J].
Quoc-Dung Ngo ;
Huy-Trung Nguyen ;
Van-Hoang Le ;
Doan-Hieu Nguyen .
ICT EXPRESS, 2020, 6 (04) :280-286
[48]  
Quoc-Ngo D., 2021, P INT C EL COMM COMP, P1
[49]  
Radare2 Team, 2017, Radare2 GitHub repository
[50]  
Raff E., 2018, P AAAI OCT, P1