GenDroid: A query-efficient black-box android adversarial attack framework

被引:1
作者
Xu, Guangquan [1 ,2 ]
Shao, Hongfei [2 ]
Cui, Jingyi [2 ]
Bai, Hongpeng [2 ]
Li, Jiliang [3 ]
Bai, Guangdong [4 ]
Liu, Shaoying [5 ]
Meng, Weizhi [6 ]
Zheng, Xi [7 ]
机构
[1] Qingdao Huanghai Univ, Big Data Sch, Qingdao, Peoples R China
[2] Tianjin Univ, Coll Intelligence & Comp, Tianjin Key Lab Adv Networking TANK, Tianjin, Peoples R China
[3] Xi An Jiao Tong Univ, Sch Cyber Sci & Engn, Xian, Peoples R China
[4] Univ Queensland, Sch Informat Technol & Elect Engn, St Lucia, Australia
[5] Hiroshima Univ, Grad Sch Adv Sci & Engn, Hiroshima, Japan
[6] Tech Univ Denmark, DTU Compute, Lyngby, Denmark
[7] Macquarie Univ, Sch Comp, Macquarie Pk, Australia
关键词
Android; Query-efficient; Adversarial examples; Black-box attack; MALWARE; SYSTEMS;
D O I
10.1016/j.cose.2023.103359
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security problems of Android applications have been gradually exposed with the increasing popularity of the Android OS. Machine learning (ML) and deep learning (DL) based Android malware detection is still suffering from adversarial attacks, although it has better performance than traditional methods. In this paper, we propose a query-efficient black-box attack method called GenDroid, which can generate high-quality Android adversarial examples with a low number of queries. We take GenDroid as an attack framework and extend it with the attention mechanism and JSMA algorithm to improve the efficiency of adversarial example production. We evaluate the effectiveness of our attack on two state-of-the-art Android malware detection schemes, Drebin and MaMaDroid. Compared with four state-of-the-art adversarial attacks on real-world datasets, GenDroid achieves higher misclassification rates with significantly the fewest number of queries on the two datasets. In addition, we have validated the effectiveness of our attack on real-world commercial anti-virus engines. Finally, to enhance the security of Android malware detector and defend against the GenDroid attack, we use combined features consisting of the associated Android features, the spatial properties of Android adversarial examples and the uncertainty to detect adversarial examples, which can achieve a high detection rate of 95.71%.& COPY; 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:12
相关论文
共 39 条
  • [1] Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems
    Abusnaina, Ahmed
    Khormali, Aminollah
    Alasmary, Hisham
    Park, Jeman
    Anwar, Afsah
    Mohaisen, Aziz
    [J]. 2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, : 1296 - 1305
  • [2] GenAttack: Practical Black-box Attacks with Gradient-Free Optimization
    Alzantot, Moustafa
    Sharma, Yash
    Chakraborty, Supriyo
    Zhang, Huan
    Hsieh, Cho-Jui
    Srivastava, Mani B.
    [J]. PROCEEDINGS OF THE 2019 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE (GECCO'19), 2019, : 1111 - 1119
  • [3] [Anonymous], 1994, VLDB'94 Proc. 20th Int. Conf. Very Large Data Bases
  • [4] Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
    Arp, Daniel
    Spreitzenbarth, Michael
    Huebner, Malte
    Gascon, Hugo
    Rieck, Konrad
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [5] Towards Evaluating the Robustness of Neural Networks
    Carlini, Nicholas
    Wagner, David
    [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 39 - 57
  • [6] Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection
    Chen, Xiao
    Li, Chaoran
    Wang, Derui
    Wen, Sheng
    Zhang, Jun
    Nepal, Surya
    Xiang, Yang
    Ren, Kui
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 987 - 1001
  • [7] A black-Box adversarial attack for poisoning clustering
    Cina, Antonio Emanuele
    Torcinovich, Alessandro
    Pelillo, Marcello
    [J]. PATTERN RECOGNITION, 2022, 122
  • [8] Cybersecurity K. E, 2017, MACH LEARN MALW DET
  • [9] Grosse K, 2016, Arxiv, DOI arXiv:1606.04435
  • [10] Grosse K, 2017, Arxiv, DOI arXiv:1702.06280