AIMED: Evolving Malware with Genetic Programming to Evade Detection

被引:29
作者
Castro, Raphael Labaca [1 ]
Schmitt, Corinna [1 ]
Rodosek, Gabi Dreo [1 ]
机构
[1] Bundeswehr Univ Munich, Res Inst CODE, Munich, Germany
来源
2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019) | 2019年
基金
欧盟地平线“2020”;
关键词
AIMED; Genetic Programming; Malware; Byte-level perturbations; Adversarial learning;
D O I
10.1109/TrustCom/BigDataSE.2019.00040
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Genetic Programming (GP) has previously proved to achieve valuable results on the fields of image processing and arcade learning. Similarly, it can be used as an adversarial learning approach to evolve malware samples until static learning classifiers are no longer able to detect it. While the implementation is relatively simple compared with other Machine Learning approaches, results proved that GP can be a competitive solution to find adversarial malware examples comparing with similar methods. Thus, AIMED Automatic Intelligent Malware Modifications to Evade Detection was designed and implemented using genetic algorithms to evade malware classifiers. Our experiments suggest that the time to achieve adversarial malware samples can be reduced up to 50% compared to classic random approaches. Moreover, we implemented AIMED to generate adversarial examples using individual malware scanners as target and tested the evasive files against further classifiers from both research and industry. The generated examples achieved up to 82% of cross-evasion rates among the classifiers.
引用
收藏
页码:240 / 247
页数:8
相关论文
共 39 条
  • [1] Anderson H. S., 2018, COMPUTING RES REPOSI, P1
  • [2] [Anonymous], 2014, COMPUTING RES REPOSI
  • [3] [Anonymous], 2017, CISC VIS NETW IND GL
  • [4] Automatic Generation of Mobile Malwares Using Genetic Programming
    Aydogan, Emre
    Sen, Sevil
    [J]. APPLICATIONS OF EVOLUTIONARY COMPUTATION, EVOAPPLICATIONS 2015, 2015, 9028 : 745 - 756
  • [5] Barreno M, 2006, P 2006 ACM S INF COM, P16
  • [6] Wild patterns: Ten years after the rise of adversarial machine learning
    Biggio, Battista
    Roli, Fabio
    [J]. PATTERN RECOGNITION, 2018, 84 : 317 - 331
  • [7] Picking on the family: Disrupting android malware triage by forcing misclassification
    Calleja, Alejandro
    Martin, Alejandro
    Menendez, Hector D.
    Tapiador, Juan
    Clark, David
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2018, 95 : 113 - 126
  • [8] Castro R. Labaca, 2019, 5 INT C INF MAN ICIM, P1
  • [9] Cheung V, 2016, OPENAI GYM
  • [10] Christodorescu M., 2004, Software Engineering Notes, V29, P34, DOI 10.1145/1013886.1007518