Semantics-Preserving Reinforcement Learning Attack Against Graph Neural Networks for Malware Detection

被引:33
作者
Zhang, Lan [1 ]
Liu, Peng [1 ]
Choi, Yoon-Ho [2 ]
Chen, Ping [3 ]
机构
[1] Penn State Univ, Dept Informat Sci & Technol, State Coll, PA 16801 USA
[2] Pusan Natl Univ, Kumjeong Ku 43241, South Korea
[3] Fudan Univ, Shanghai 200437, Peoples R China
关键词
Malware; Feature extraction; Codes; Semantics; Reinforcement learning; Graph neural networks; Viruses (medical); Adversarial samples generation; graph neural networks; malware detection; reinforcement learning;
D O I
10.1109/TDSC.2022.3153844
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As an increasing number of deep-learning-based malware scanners have been proposed, the existing evasion techniques, including code obfuscation and polymorphic malware, are found to be less effective. In this work, we propose a reinforcement learning based semantics-preserving (i.e. functionality-preserving) attack against black-box GNNs (Graph Neural Networks) for malware detection. The key factor of adversarial malware generation via semantic Nops insertion is to select the appropriate semantic Nops and their corresponding basic blocks. The proposed attack uses reinforcement learning to automatically make these "how to select" decisions. To evaluate the attack, we have trained two kinds of GNNs with three types (e.g., Backdoor, Trojan, and Virus) of Windows malware samples and various benign Windows programs. The evaluation results have shown that the proposed attack can achieve a significantly higher evasion rate than four baseline attacks, namely the binary diversification attack, the semantics-preserving random instruction insertion attack, the semantics-preserving accumulative instruction insertion attack, and the semantics-preserving gradient-based instruction insertion attack.
引用
收藏
页码:1390 / 1402
页数:13
相关论文
共 47 条
[1]   Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems [J].
Abusnaina, Ahmed ;
Khormali, Aminollah ;
Alasmary, Hisham ;
Park, Jeman ;
Anwar, Afsah ;
Mohaisen, Aziz .
2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, :1296-1305
[2]   Adversarial Deep Learning for Robust Detection of Binary Encoded Malware [J].
Al-Dujaili, Abdullah ;
Huang, Alex ;
Hemberg, Erik ;
O'reilly, Una-May .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, :76-82
[3]   Convolutional Neural Networks over Control Flow Graphs for Software Defect Prediction [J].
Anh Viet Phan ;
Minh Le Nguyen ;
Lam Thu Bui .
2017 IEEE 29TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2017), 2017, :45-52
[4]  
[Anonymous], 2015, FPS
[5]  
[Anonymous], VIRUSSHARE
[6]  
[Anonymous], VirusTotal
[7]  
Braue D., 2015, Security tools taking too long to detect new malware, analysis warns
[8]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[9]  
Chen JY, 2018, Arxiv, DOI arXiv:1809.02797
[10]  
Chen PY, 2017, PROCEEDINGS OF THE 10TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2017, P15, DOI 10.1145/3128572.3140448