Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection

被引:84
作者
Demetrio, Luca [1 ]
Coull, Scott E. [2 ]
Biggio, Battista [1 ,3 ]
Lagorio, Giovanni [4 ]
Armando, Alessandro [4 ]
Roli, Fabio [1 ,3 ]
机构
[1] Univ Cagliari, Dipartimento Ingn Elettr Elettron DIEE, Via Castelfidardo 1, I-09123 Cagliari, Italy
[2] FireEye, 601 McCarthy Blvd, Milpitas, CA 95035 USA
[3] Pluribus One, Cagliari, Sardegna, Italy
[4] Univ Genoa, Dipartimento Informat Bioingn Robot & Ingn Sistem, Genoa, Italy
基金
欧盟地平线“2020”;
关键词
Adversarial examples; malware detection; evasion; semantics-invariant manipulations;
D O I
10.1145/3473039
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent work has shown that adversarial Windows malware samples-referred to as adversarial EXEmples in this article-can bypass machine learning-based detection relying on static code analysis by perturbing relatively few input bytes. To preserve malicious functionality, previous attacks either add bytes to existing non-functional areas of the file, potentially limiting their effectiveness, or require running computationally demanding validation steps to discard malware variants that do not correctly execute in sandbox environments. In this work, we overcome these limitations by developing a unifying framework that does not only encompass and generalize previous attacks against machine-learning models, but also includes three novel attacks based on practical, functionality-preserving manipulations to the Windows Portable Executable file format. These attacks, named Full DOS, Extend, and Shift, inject the adversarial payload by respectively manipulating the DOS header, extending it, and shifting the content of the first section. Our experimental results show that these attacks outperform existing ones in both white-box and black-box scenarios, achieving a better tradeoff in terms of evasion rate and size of the injected payload, while also enabling evasion of models that have been shown to be robust to previous attacks. To facilitate reproducibility of our findings, we open source our framework and all the corresponding attack implementations as part of the secml-malware Python library. We conclude this work by discussing the limitations of current machine learning-based malware detectors, along with potential mitigation strategies based on embedding domain knowledge coming from subject-matter experts directly into the learning process.
引用
收藏
页数:31
相关论文
共 38 条
[1]   When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features [J].
Aghakhani, Hojjat ;
Gritti, Fabio ;
Mecca, Francesco ;
Lindorfer, Martina ;
Ortolani, Stefano ;
Balzarotti, Davide ;
Vigna, Giovanni ;
Krueger, Christopher .
27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
[2]  
Anderson H.S, 2018, ARXIV PREPRINT ARXIV
[3]  
Anderson H.S., 2017, Black Hat USA
[4]  
Biggio Battista, 2013, Machine Learning and Knowledge Discovery in Databases. European Conference, ECML PKDD 2013. Proceedings: LNCS 8190, P387, DOI 10.1007/978-3-642-40994-3_25
[5]   Security Evaluation of Pattern Classifiers under Attack [J].
Biggio, Battista ;
Fumera, Giorgio ;
Roli, Fabio .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (04) :984-996
[6]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[7]   AIMED: Evolving Malware with Genetic Programming to Evade Detection [J].
Castro, Raphael Labaca ;
Schmitt, Corinna ;
Rodosek, Gabi Dreo .
2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, :240-247
[8]  
Chen PY, 2017, PROCEEDINGS OF THE 10TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2017, P15, DOI 10.1145/3128572.3140448
[9]  
Coull Scott E., 2019, 2019 IEEE Security and Privacy Workshops (SPW). Proceedings, P21, DOI 10.1109/SPW.2019.00017
[10]  
David OE, 2015, IEEE IJCNN