Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes

被引:43
作者
Lucas, Keane [1 ]
Sharif, Mahmood [2 ,3 ]
Bauer, Lujo [1 ]
Reiter, Michael K. [4 ]
Shintre, Saurabh [5 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] Tel Aviv Univ, Tel Aviv, Israel
[3] VMware, Tel Aviv, Israel
[4] Duke Univ, Durham, NC 27706 USA
[5] NortonLifeLock Res Grp, Washington, DC USA
来源
ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2021年
基金
美国国家科学基金会; 美国安德鲁·梅隆基金会;
关键词
adversarial machine learning; malware; neural networks; security;
D O I
10.1145/3433210.3453086
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Motivated by the transformative impact of deep neural networks (DNNs) in various domains, researchers and anti-virus vendors have proposed DNNs for malware detection from raw bytes that do not require manual feature engineering. In this work, we propose an attack that interweaves binary-diversification techniques and optimization frameworks to mislead such DNNs while preserving the functionality of binaries. Unlike prior attacks, ours manipulates instructions that are a functional part of the binary, which makes it particularly challenging to defend against. We evaluated our attack against three DNNs in white- and black-box settings, and found that it often achieved success rates near 100%. Moreover, we found that our attack can fool some commercial anti-viruses, in certain cases with a success rate of 85%. We explored several defenses, both new and old, and identified some that can foil over 80% of our evasion attempts. However, these defenses may still be susceptible to evasion by attacks, and so we advocate for augmenting malware-detection systems with methods that do not rely on machine learning.
引用
收藏
页码:744 / 758
页数:15
相关论文
共 102 条
[1]  
Anderson H.S., 2017, Evading machine learning malware detection, P1
[2]  
AndrewWalenstein Rachit, 2006, PROC SCAM
[3]  
[Anonymous], 2017, P NIPS
[4]  
[Anonymous], 2018, PROC AAAIW
[5]  
[Anonymous], 2017, arXiv
[6]  
[Anonymous], 2002, P 9 ACM C COMP COMM
[7]  
[Anonymous], 2018, P CVPR
[8]  
Armoun Seyed Emad, 2012, PROC FIT
[9]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[10]  
Athalye A, 2018, Arxiv, DOI arXiv:1804.03286