2021 IEEE Security and Privacy Workshops (SPW) 2021
DOI: 10.1109/spw53761.2021.00021
|View full text |Cite
|
Sign up to set email alerts
|

Binary Black-Box Attacks Against Static Malware Detectors with Reinforcement Learning in Discrete Action Spaces

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 17 publications
0
10
0
Order By: Relevance
“…Without addressing adversarial attacks, proposing malware detectors or classifiers is an endless and unfruitful task lacking substantial scientific advancement. For instance, the DL-based static malware detector proposed in another paper worked well in the evaluation, but malware adversarial samples still sneak through the model [13][14][15]29]. That is probably why the malware never stops despite the hundreds of detectors being proposed.…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…Without addressing adversarial attacks, proposing malware detectors or classifiers is an endless and unfruitful task lacking substantial scientific advancement. For instance, the DL-based static malware detector proposed in another paper worked well in the evaluation, but malware adversarial samples still sneak through the model [13][14][15]29]. That is probably why the malware never stops despite the hundreds of detectors being proposed.…”
Section: Motivationmentioning
confidence: 99%
“…The process of MalDBA is as follows: First, malicious datasets are obtained from the VirusShare website [12], benign datasets are collected through crawling, and a malware detection model MalConv is pretrained [13]. Then, two different black-box adversarial attacks are reconstructed [14,15], and the history of query results (also known as the intermediate samples) of these attacks are saved. We can find that the prediction scores of these intermediate samples under MalConv model detection are gradually decreasing (meaning that the original malware tends to become a benign-looking sample after adding perturbations).…”
Section: Introductionmentioning
confidence: 99%
“…On the basis of gym-malware, there are multiple follow-up work [20,39,41,42,72,76,139] proposing problem-space black-box adversarial attacks against static PE malware detection models.…”
Section: 22mentioning
confidence: 99%
“…Ebrahimi et al [39] suggest that the RL-based adversarial attacks against PE malware detectors normally employ actor-critic or DQN, which are limited in handling environments with combinatorially large state space. Naturally, they propose an improved RL-based adversarial attack framework of AMG-VAC on the basis of gym-malware [8,9] by adopting the variational actor-critic, which has been demonstrated to be the state-of-the-art performance in handling environments with combinatorially large state space.…”
Section: 22mentioning
confidence: 99%
See 1 more Smart Citation