An Adversarial Attack on ML-Based IoT Malware Detection Using Binary Diversification Techniques

被引:1
作者
Mwangi, Maina Bernard [1 ]
Cheng, Shin-Ming [1 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taipei 10607, Taiwan
关键词
Adversarial attack; binary diversification; Internet of Things (IoT) malware detection; machine learning;
D O I
10.1109/ACCESS.2024.3513713
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The integration of machine learning (ML) has revolutionized malware detection, enabling accurate identification of subtle distinctions between malware and benignware. As the threat landscape continually evolves and new malware strains emerge, conventional signature-based detectors are becoming increasingly inadequate, leading to a growing reliance on ML-based detectors. However, ML-based detection systems are particularly vulnerable to adversarial attacks, where subtle alterations to input samples can deceive detectors into misclassifying malware as benignware, highlighting the need for robustness studies, as such misclassifications can lead to significant damage. To this end, we stage a black-box attack on IoT malware detection systems, specifically targeting structure-based detectors, which are predominant due to their ability to detect malware across diverse CPU architectures in IoT environments. Our strategy employs semantic-preserving binary diversification techniques, including function inlining, branch function insertion, control flow graph flattening, and basic block merging and reordering, to modify malware binaries and evade detection. We train a multi-structural substitute detector (based on a combination of control flow graph and function call graph features) on a large-scale dataset of IoT ELF binaries, achieving detection rates of up to 98.24%. Using explainable AI (XAI), we transfer the attack to four structural target detectors, achieving evasion rates of up to 100% on certain detectors, with an average binary size increase of just 8.35%. The modified samples evade detection by a state-of-the-art adversarial detector and several commercial antivirus engines, highlighting the persistent challenge of defending against adversarial threats and emphasizing the need for enhanced and multi-faceted defense mechanisms.
引用
收藏
页码:185172 / 185186
页数:15
相关论文
共 71 条
[61]   Efficient Detection and Classification of Internet-of-Things Malware Based on Byte Sequences from Executable Files [J].
Wan, Tzu-Ling ;
Ban, Tao ;
Cheng, Shin-Ming ;
Lee, Yen-Ting ;
Sun, Bo ;
Isawa, Ryoichi ;
Takahashi, Takeshi ;
Inoue, Daisuke .
IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2020, 1 (01) :262-275
[62]   Generating Effective Software Obfuscation Sequences With Reinforcement Learning [J].
Wang, Huaijin ;
Wang, Shuai ;
Xu, Dongpeng ;
Zhang, Xiangyu ;
Liu, Xiao .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) :1900-1917
[63]  
Wang S, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P627
[64]   MDEA: Malware Detection with Evolutionary Adversarial Learning [J].
Wang, Xiruo ;
Miikkulainen, Risto .
2020 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2020,
[65]   Enhancing Machine Learning Based Malware Detection Model by Reinforcement Learning [J].
Wu, Cangshuai ;
Shi, Jiangyong ;
Yang, Yuexiang ;
Li, Wenhua .
ICCNS 2018: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORK SECURITY, 2018, :74-78
[66]   IoT malware classification based on reinterpreted function-call graphs [J].
Wu, Chia-Yi ;
Ban, Tao ;
Cheng, Shin-Ming ;
Takahashi, Takeshi ;
Inoue, Daisuke .
COMPUTERS & SECURITY, 2023, 125
[67]   IoT Malware Detection Using Function-Call-Graph Embedding [J].
Wu, Chia-Yi ;
Ban, Tao ;
Cheng, Shin-Ming ;
Sun, Bo ;
Takahashi, Takeshi .
2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
[68]   Black-Box Adversarial Attacks Against Deep Learning Based Malware Binaries Detection with GAN [J].
Yuan, Junkun ;
Zhou, Shaofang ;
Lin, Lanfen ;
Wang, Feng ;
Cui, Jia .
ECAI 2020: 24TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2020, 325 :2536-2542
[69]   Semantics-Preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection [J].
Zhang, Lan ;
Liu, Peng ;
Choi, Yoon-Ho ;
Chen, Ping .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) :1390-1402
[70]   Structural Attack against Graph Based Android Malware Detection [J].
Zhao, Kaifa ;
Zhou, Hao ;
Zhu, Yulin ;
Zhan, Xian ;
Zhou, Kai ;
Li, Jianfeng ;
Yu, Le ;
Yuan, Wei ;
Luo, Xiapu .
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, :3218-3235