首页> 外文会议>European Conference on Artificial Intelligence;Conference on Prestigious Applications of Intelligent Systems >Black-Box Adversarial Attacks Against Deep Learning Based Malware Binaries Detection with GAN
【24h】

Black-Box Adversarial Attacks Against Deep Learning Based Malware Binaries Detection with GAN

机译:基于深入学习的恶意软件二进制文件检测的黑匣子对抗攻击

获取原文

摘要

For efficient malware detection, there are more and more deep learning methods based on raw software binaries. Recent studies show that deep learning models can easily be fooled to make a wrong decision by introducing subtle perturbations to inputs, which attracts a large influx of work in adversarial attacks. However, most of the existing attack methods are based on manual features (e.g., API calls) or in the white-box setting, making the attacks impractical in current real-world scenarios. In this work, we propose a novel attack framework called GAPGAN, which generates adversarial pay-loads (padding bytes) with generative adversarial networks (GANs). To the best of our knowledge, it is the first work that performs end-to-end black-box attacks at the byte-level against deep learning based malware binaries detection. In our attack framework, we map input discrete malware binaries to continuous space, then feed it to the generator of GAPGAN to generate adversarial payloads. We append payloads to the original binaries to craft an adversarial sample while preserving its functionality. We propose to use a dynamic threshold for reducing the loss of the effectiveness of the payloads when mapping it from continuous format back to the original discrete format. For balancing the attention of the generator to the payloads and the adversarial samples, we use an automatic weight tuning strategy. We train GAPGAN with both malicious and benign software. Once the training is finished, the generator can generate an adversarial sample with only the input malware in less than twenty milliseconds. We apply GAPGAN to attack the state-of-the-art detector MalConv and achieve 100% attack success rate with only appending payloads of 2.5% of the total length of the data for detection. We also attack deep learning models with different structures under different defense methods. The experiments show that GAPGAN outperforms other state-of-the-art attack models in efficiency and effectiveness.
机译:为了有效恶意软件检测,基于原始软件二进制文件的越来越深入的学习方法。最近的研究表明,深入学习模型很容易被引入对投入的微妙扰动来做出错误的决定,这在对抗攻击中吸引了大量的工作。但是,大多数现有攻击方法都基于手动功能(例如,API呼叫)或在白盒设置中,使当前的现实情景中的攻击不切实际。在这项工作中,我们提出了一种名为Gapgan的新型攻击框架,其产生具有生成对冲网络(GANS)的对抗性应酬(填充字节)。据我们所知,它是第一个在基于深度学习的恶意软件二进制文件检测的字节级执行端到端黑匣子攻击的第一项工作。在我们的攻击框架中,我们将输入的离散恶意软件二进制文件映射到连续空间,然后将其馈送到GapGan的生成器以产生对抗性有效载荷。我们将有效载荷附加到原始二进制文件中,以在保留其功能的同时制作对抗性样本。我们建议使用动态阈值来减少当将其从连续格式映射到原始离散格式时减少有效载荷的有效性的损失。为了平衡发电机对有效载荷和对冲样本的关注,我们使用自动调整策略。我们用恶意和良性软件训练GapGan。一旦训练完成,发电机就可以在少于二十毫秒内的输入恶意软件生成对抗性样本。我们应用GapGan攻击最先进的探测器Malconv并实现100%的攻击成功率,只有占据检测数据总长度的2.5%的有效载荷。我们还在不同的防御方法下用不同的结构攻击深入学习模型。实验表明,Gapgan以效率和有效性的其他最先进的攻击模式优于其他最先进的攻击模型。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号