Explaining Black-box Android Malware Detection

被引:0
|
作者
Melis, Marco [1 ]
Maiorca, Davide [1 ]
Biggio, Battista [1 ,2 ]
Giacinto, Giorgio [1 ,2 ]
Roli, Fabio [1 ,2 ]
机构
[1] Univ Cagliari, DIEE, Piazza Armi, I-09123 Cagliari, Italy
[2] Pluribus One, Cagliari, Italy
来源
2018 26TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO) | 2018年
基金
欧盟地平线“2020”;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Machine-learning models have been recently used for detecting malicious Android applications, reporting impressive performances on benchmark datasets, even when trained only on features statically extracted from the application, such as system calls and permissions. However, recent findings have high-lighted the fragility of such in-vitro evaluations with benchmark datasets, showing that very few changes to the content of Android malware may suffice to evade detection. How can we thus trust that a malware detector performing well on benchmark data will continue to do so when deployed in an operating environment? To mitigate this issue, the most popular Android malware detectors use linear, explainable machine-learning models to easily identify the most influential features contributing to each decision. In this work, we generalize this approach to any black-box machine-learning model, by leveraging a gradient-based approach to identify the most influential local features. This enables using nonlinear models to potentially increase accuracy without sacrificing interpretability of decisions. Our approach also highlights the global characteristics learned by the model to discriminate between benign and malware applications. Finally, as shown by our empirical analysis on a popular Android malware detection task, it also helps identifying potential vulnerabilities of linear and nonlinear models against adversarial manipulations.
引用
收藏
页码:524 / 528
页数:5
相关论文
共 50 条
  • [1] Analyzing and Explaining Black-Box Models for Online Malware Detection
    Manthena, Harikha
    Kimmel, Jeffrey C.
    Abdelsalam, Mahmoud
    Gupta, Maanak
    IEEE ACCESS, 2023, 11 : 25237 - 25252
  • [2] EvadeDroid: A practical evasion attack on machine learning for black-box Android malware detection
    Bostani, Hamid
    Moonsamy, Veelasha
    COMPUTERS & SECURITY, 2024, 139
  • [3] Malware Detection Using Black-Box Neural Method
    Pieczynski, Dominik
    Jedrzejek, Czeslaw
    MULTIMEDIA AND NETWORK INFORMATION SYSTEMS, 2019, 833 : 180 - 189
  • [4] Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information
    Li, Heng
    Cheng, Zhang
    Wu, Bang
    Yuan, Liheng
    Gao, Cuiying
    Yuan, Wei
    Luo, Xiapu
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 1181 - 1198
  • [5] Black box analysis of android malware detectors
    Nellaivadivelu, Guruswamy
    Di Troia, Fabio
    Stamp, Mark
    ARRAY, 2020, 6 (06)
  • [6] MalDBA: Detection for Query-Based Malware Black-Box Adversarial Attacks
    Kong, Zixiao
    Xue, Jingfeng
    Liu, Zhenyan
    Wang, Yong
    Han, Weijie
    ELECTRONICS, 2023, 12 (07)
  • [7] Explaining black-box classifiers: Properties and functions
    Amgoud, Leila
    INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2023, 155 : 40 - 65
  • [8] Explaining Black-box Classification Models with Arguments
    Amgoud, Leila
    2021 IEEE 33RD INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2021), 2021, : 791 - 795
  • [9] Binary Black-Box Adversarial Attacks with Evolutionary Learning against IoT Malware Detection
    Wang, Fangwei
    Lu, Yuanyuan
    Wang, Changguang
    Li, Qingru
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [10] Explaining the black-box smoothly-A counterfactual approach
    Singla, Sumedha
    Eslami, Motahhare
    Pollack, Brian
    Wallace, Stephen
    Batmanghelich, Kayhan
    MEDICAL IMAGE ANALYSIS, 2023, 84