Adversarial superiority in android malware detection: Lessons from reinforcement learning based evasion attacks and defenses

被引:0
作者
Rathore, Hemant [1 ]
Nandanwar, Adarsh [1 ]
Sahay, Sanjay K. [1 ]
Sewak, Mohit [2 ]
机构
[1] BITS Pilani, Dept CS & IS, Goa Campus, Pilani, India
[2] Microsoft, Secur & Compliance Res, Hyderabad, India
来源
FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION | 2023年 / 44卷
关键词
Android; Adversarial robustness; Machine and deep learning; Malware detection; Reinforcement learning;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, android smartphones are being used by billions of users and thus have become a lucrative target of malware designers. Therefore being one step ahead in this zero-sum game of malware detection between the anti-malware community and malware developers is more of a necessity than a desire. This work focuses on a proactive adversary-aware framework to develop adversarially superior android malware detection models. We first investigate the adversarial robustness of thirty-six distinct malware detection models constructed using two static features (permission and intent) and eighteen classification algorithms. We designed two Targeted Type-II Evasion Attacks (TRPO-MalEAttack and PPO-MalEAttack) based on reinforcement learning to exploit vulnerabilities in the above malware detection models. The attacks aim to add minimum perturbations in each malware application and convert it into an adversarial application that can fool the malware detection models. The TRPO-MalEAttack achieves an average fooling rate of 95.75% (with 2.02 mean perturbations), reducing the average accuracy from 86.01% to 49.11% in thirty-six malware detection models. On the other hand, The PPO-MalEAttack achieves a higher average fooling rate of 96.87% (with 2.08 mean perturbations), reducing the average accuracy from 86.01% to 48.65% in the same thirty-six detection models. We also develop a list of the TEN most vulnerable android permissions and intents that an adversary can use to generate more adversarial applications. Later, we propose a defense strategy (MalVPatch) to counter the adversarial attacks on malware detection models. The MalVPatch defense achieves higher detection accuracy along with a drastic improvement in the adversarial robustness of malware detection models. Finally, we conclude that investigating the adversarial robustness of models is necessary before their real-world deployment and helps achieve adversarial superiority in android malware detection. & COPY; 2023 The Author(s). Published by Elsevier Ltd on behalf of DFRWS This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:10
相关论文
共 26 条
  • [1] [Anonymous], 2022, GLOBAL DIGITAL REPOR
  • [2] [Anonymous], 2022, ZIMPERIUM GLOBAL MOB
  • [3] [Anonymous], 2022, SOPHOS THREAT REPORT
  • [4] [Anonymous], 2022, MCAFEE MOBILE THREAT
  • [5] PermPair: Android Malware Detection Using Permission Pairs
    Arora, Anshul
    Peddoju, Sateesh K.
    Conti, Mauro
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 1968 - 1982
  • [6] A Survey on Adversarial Recommender Systems: From Attack/Defense Strategies to Generative Adversarial Networks
    Deldjoo, Yashar
    Di Noia, Tommaso
    Merra, Felice Antonio
    [J]. ACM COMPUTING SURVEYS, 2021, 54 (02)
  • [7] Goodfellow I. J., 2015, INT C LEARN REPR, DOI DOI 10.48550/ARXIV.1412.6572
  • [8] Grosse K, 2016, Arxiv, DOI [arXiv:1606.04435, DOI 10.48550/ARXIV.1606.04435]
  • [9] Hu WW, 2017, Arxiv, DOI arXiv:1702.05983
  • [10] Khariwal K, 2020, PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), P197, DOI [10.1109/worlds450073.2020.9210414, 10.1109/WorldS450073.2020.9210414]