2019
DOI: 10.1145/3332184
|View full text |Cite
|
Sign up to set email alerts
|

Towards Adversarial Malware Detection

Abstract: Malware still constitutes a major threat in the cybersecurity landscape, also due to the widespread use of infection vectors such as documents. These infection vectors hide embedded malicious code to the victim users, facilitating the use of social engineering techniques to infect their machines. Research showed that machine-learning algorithms provide effective detection mechanisms against such threats, but the existence of an arms race in adversarial settings has recently challenged such systems. In this wor… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 63 publications
(12 citation statements)
references
References 65 publications
(256 reference statements)
0
12
0
Order By: Relevance
“…In addition, unlike previous work, Maiorca et al [9] presented a survey of PDF malware detection in an adversarial environment. They provide a comprehensive study on PDF preprocessing.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, unlike previous work, Maiorca et al [9] presented a survey of PDF malware detection in an adversarial environment. They provide a comprehensive study on PDF preprocessing.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, analyzing and detecting DLbased malware black-box adversarial attacks is a difficult task for anti-malware researchers. The existing optimal defense methods are stateless detection methods such as adversarial retraining and distillation, which detect whether the input sample is benign or malicious without judging whether there is an adversarial attack [8,9]. Existing malware stateful detection methods are implemented in the feature space, which requires data preprocessing and feature extraction [10,11].…”
Section: Introductionmentioning
confidence: 99%
“…Many works in the past have focused on malicious PDF file detection [3], [26], [33]- [39]. Others focus on specific PDF attack vectors such as Malicious URL detection [40], and PDF JavaScript detection [41].…”
Section: B Pdf Cdrmentioning
confidence: 99%
“…DL-based malware detection approaches are susceptible to adversarial attacks [33][34][35][36][37]. Adversarial modifications by manipulating only a small fraction of raw binary data may lead to misclassification.…”
Section: Adversarial Attack Against Malware Detection Modelmentioning
confidence: 99%