The 11th International Symposium on Information and Communication Technology 2022
DOI: 10.1145/3568562.3568636
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging Reinforcement Learning and Generative Adversarial Networks to Craft Mutants of Windows Malware against Black-box Malware Detectors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…B. Using AI for development-mutating malware that evades detection [15] Recent advancements in generative AI have led to the development of proof-of-concept models for polymorphic malware. These models demonstrate the potential of dynamically mutating malware payloads to evade detection and bypass endpoint and response (EDR) filters.…”
Section: Difficulties In Malware Detection and Incident Responsementioning
confidence: 99%
“…B. Using AI for development-mutating malware that evades detection [15] Recent advancements in generative AI have led to the development of proof-of-concept models for polymorphic malware. These models demonstrate the potential of dynamically mutating malware payloads to evade detection and bypass endpoint and response (EDR) filters.…”
Section: Difficulties In Malware Detection and Incident Responsementioning
confidence: 99%
“…In the field of industrial IoT, Benaddi et al [43] focused on anomaly detection in Intrusion Detection Systems (IDS) using Distributional Reinforcement Learning and GAN. Phan et al [28] proposed an evasion method for black-box malware detectors to evaluate the effectiveness of RL and its combination with GAN, however the focus of their research work is only the comparison between both approaches and did not consider recent state-of-the-art evasion methods in their result analysis. Moreover, they targeted only blackdoor malware samples whereas we conducted our experiments on blackdoor and ransomware malware as ransomware attacks pose a serious threat in IoT devices [44].…”
Section: B Malware Evasion Techniquesmentioning
confidence: 99%