2019 5th International Conference on Information Management (ICIM) 2019
DOI: 10.1109/infoman.2019.8714698
|View full text |Cite
|
Sign up to set email alerts
|

ARMED: How Automatic Malware Modifications Can Evade Static Detection?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(19 citation statements)
references
References 22 publications
0
19
0
Order By: Relevance
“…Consistent with our goal of proposing a more realistic AME attack scenario in our study, we examine the past AME studies that support black-box and binary black-box attacks. Among these studies, AME studies that offer black-box attacks do not require knowing the specifications of the targeted anti-malware (Demetrio et al 2020;Castro, Biggio, and Dreo Rodosek 2019;Castro, Schmitt, and Rodosek 2019;Chen et al 2019a;Park, Khan, and Yener 2019;Suciu, Coull, and Johns 2019;Hu and Tan 2018). These studies employ a wide range of methods such as genetic algorithm (Demetrio et al 2020), random perturbations (Castro, Schmitt, and Rodosek 2019;Chen et al 2019a), dynamic programming (Park, Khan, and Yener 2019), and RNN (Hu and Tan 2018).…”
Section: Anti-malware Evasionmentioning
confidence: 99%
“…Consistent with our goal of proposing a more realistic AME attack scenario in our study, we examine the past AME studies that support black-box and binary black-box attacks. Among these studies, AME studies that offer black-box attacks do not require knowing the specifications of the targeted anti-malware (Demetrio et al 2020;Castro, Biggio, and Dreo Rodosek 2019;Castro, Schmitt, and Rodosek 2019;Chen et al 2019a;Park, Khan, and Yener 2019;Suciu, Coull, and Johns 2019;Hu and Tan 2018). These studies employ a wide range of methods such as genetic algorithm (Demetrio et al 2020), random perturbations (Castro, Schmitt, and Rodosek 2019;Chen et al 2019a), dynamic programming (Park, Khan, and Yener 2019), and RNN (Hu and Tan 2018).…”
Section: Anti-malware Evasionmentioning
confidence: 99%
“…The experiments conducted in the paper show in comparison with traditional compression methods this method has achieved better compression results and is also able to achieve hierarchical synthesis of non-essential parts of the image (trees and rivers) with essential components like houses and roads. [70] 2017 IDSGAN used to generate malware attacks which can bypass the different intrusion detection systems (IDS) Achieved high degree of evasion against IDS Heusel et al [71] 2017 Framework to target portable executable (PE) anti malware systems in an offensive way Advantage: proved to be an effective model to identify the vulnerabilities of the anti-malware systems Arjovsky et al [72] 2017 Model to generate malware instances for Black-Box Attacks Based on GAN Gulrajani et al [73] 2019 Adversarial sample generation to launch attack against malware classifiers Singh et al [74] 2019 Generative model for malware images that could be used to boost classifier's performance by performing data augmentation Advantage: leveraged to generate malware images which would alleviate the problem of public sharing of the dataset Odena et al [75] 2016 Class-conditional image synthesis model to segregate generated samples to their respective malware category without any manual intervention Anderson et al [76] 2016 Model to bypass a detector of web domain generation algorithm Rigaki et al [77] 2018 To adapt malware communication to force misclassification of new generation Intrusion Prevention Systems (IPS) Advantage: effective at modifying malware traffic in order to remain undetectable Labaca et al [78] 2019 GAN to inject automatic byte-level perturbations into PE files to fool the classifier Kawai et al [79] 2020 Bypass malware defenders by adding benign to the original malicious code Advantage: resolve the problem of creating an huge collection of APIs to bypass the detectors BlockChain Zheng [80] 2020 GANs based technology for exchange of secret key which also overcome the block chain problems of security, recovery of lost key and communication inefficiency Advantage: a new avenue is opened the exchange of secret key which us reliable and adaptive as well as efficient…”
Section: Unmanned Aerial Vehicles (Uav's)mentioning
confidence: 99%
“…The malicious code was customized to duplicate the network traffic of the chat application and proposed work suggested that GANs can be successful at modifying malware traffic in order to remain undetectable. The authors implemented a GAN to inject automatic bytelevel perturbations into PE files [78]. The authors proposed an approach to bypass detectors by inculcating benign features to the malicious code [79].…”
Section: Malware Detectionmentioning
confidence: 99%
“…Second, regarding selected attack methods, a few notable attack methods include simple append attack [9], attacking using randomly generated perturbation [4], and attacking using specific perturbations that lowers a malware detector's score [5]. More advanced methods incorporate machine learning techniques (Genetic Programming [1] [6], Gradient Descent [3], and Dynamic Programming [7]) and implement advanced DL-based techniques (Generative Adversarial Networks [8], Deep Reinforcement Learning [10], and Generative Recurrent Neural Networks [2] [11]). Third, and most importantly, while a sizable amount of AMG research either do not limit the number of queries to the malware detector or allow conducting multiple queries, few studies (Suciu et al [9]) operate in a single-shot AMG evasion setting.…”
Section: A Adversarial Malware Generation (Amg)mentioning
confidence: 99%