Adversarial Examples for Malware Detection

被引:326
作者
Grosse, Kathrin [1 ]
Papernot, Nicolas [2 ]
Manoharan, Praveen [1 ]
Backes, Michael [1 ]
McDaniel, Patrick [2 ]
机构
[1] Saarland Univ, CISPA, Saarland Informat Campus, Saarbrucken, Germany
[2] Penn State Univ, Sch Elect Engn & CS, State Coll, PA USA
来源
COMPUTER SECURITY - ESORICS 2017, PT II | 2017年 / 10493卷
基金
欧洲研究理事会;
关键词
D O I
10.1007/978-3-319-66399-9_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning models are known to lack robustness against inputs crafted by an adversary. Such adversarial examples can, for instance, be derived from regular inputs by introducing minor yet carefully selected-perturbations. In this work, we expand on existing adversarial example crafting algorithms to construct a highly-effective attack that uses adversarial examples against malware detection models. To this end, we identify and overcome key challenges that prevent existing algorithms from being applied against malware detection: our approach operates in discrete and often binary input domains, whereas previous work operated only in continuous and differentiable domains. In addition, our technique guarantees the malware functionality of the adversarially manipulated program. In our evaluation, we train a neural network for malware detection on the DREBIN data set and achieve classification performance matching state-of-the-art from the literature. Using the augmented adversarial crafting algorithm we then manage to mislead this classifier for 63% of all malware samples. We also present a detailed evaluation of defensive mechanisms previously introduced in the computer vision contexts, including distillation and adversarial training, which show promising results.
引用
收藏
页码:62 / 79
页数:18
相关论文
共 39 条
  • [1] Alexander G., 2016, ABS160107213 CORR
  • [2] Androutsopoulos I., 2000, P EUR C MACH LEARN, P9
  • [3] [Anonymous], 2017, ARXIV E PRINTS
  • [4] [Anonymous], ABS14125068 CORR
  • [5] [Anonymous], ARXIV160202697
  • [6] Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
    Arp, Daniel
    Spreitzenbarth, Michael
    Huebner, Malte
    Gascon, Hugo
    Rieck, Konrad
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [7] The security of machine learning
    Barreno, Marco
    Nelson, Blaine
    Joseph, Anthony D.
    Tygar, J. D.
    [J]. MACHINE LEARNING, 2010, 81 (02) : 121 - 148
  • [8] Biggio B., 2013, P 2013 EUROPEAN C MA, DOI DOI 10.1007/978-3-642-40994-3_25
  • [9] Bojarski Mariusz, 2016, arXiv
  • [10] Dahl GE, 2013, INT CONF ACOUST SPEE, P3422, DOI 10.1109/ICASSP.2013.6638293