...
首页> 外文期刊>IEEE transactions on information forensics and security >Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection
【24h】

Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection

机译:Android HIV:重新包装恶意软件以逃避机器学习检测的研究

获取原文
获取原文并翻译 | 示例
           

摘要

Machine learning-based solutions have been successfully employed for the automatic detection of malware on Android. However, machine learning models lack robustness to adversarial examples, which are crafted by adding carefully chosen perturbations to the normal inputs. So far, the adversarial examples can only deceive detectors that rely on syntactic features (e.g., requested permissions, API calls, etc.), and the perturbations can only be implemented by simply modifying application's manifest. While recent Android malware detectors rely more on semantic features from Dalvik bytecode rather than manifest, existing attacking/defending methods are no longer effective. In this paper, we introduce a new attacking method that generates adversarial examples of Android malware and evades being detected by the current models. To this end, we propose a method of applying optimal perturbations onto Android APK that can successfully deceive the machine learning detectors. We develop an automated tool to generate the adversarial examples without human intervention. In contrast to existing works, the adversarial examples crafted by our method can also deceive recent machine learning-based detectors that rely on semantic features such as control-flow-graph. The perturbations can also be implemented directly onto APK's Dalvik bytecode rather than Android manifest to evade from recent detectors. We demonstrate our attack on two state-of-the-art Android malware detection schemes, MaMaDroid and Drebin. Our results show that the malware detection rates decreased from 96% to 0% in MaMaDroid, and from 97% to 0% in Drebin, with just a small number of codes to be inserted into the APK.
机译:基于机器学习的解决方案已成功用于Android上恶意软件的自动检测。但是,机器学习模型对对抗性示例缺乏鲁棒性,而对抗性示例是通过在常规输入中添加精心选择的扰动来制作的。到目前为止,对抗性示例只能欺骗依赖于语法功能(例如请求的权限,API调用等)的检测器,并且只能通过简单地修改应用程序清单来实现干扰。尽管最近的Android恶意软件检测器更多地依赖Dalvik字节码的语义特征而不是明显的特征,但现有的攻击/防御方法不再有效。在本文中,我们介绍了一种新的攻击方法,该方法会生成Android恶意软件的对抗示例,并逃避当前模型所检测到的情况。为此,我们提出了一种将最佳扰动应用于Android APK的方法,该方法可以成功地欺骗机器学习检测器。我们开发了一种自动化工具,无需人工干预即可生成对抗性示例。与现有作品相比,通过我们的方法制作的对抗性示例还可以欺骗依赖于语义特征(例如控制流图)的基于机器学习的最新检测器。扰动也可以直接在APK的Dalvik字节码上实现,而不是从最近的检测器中规避Android清单。我们展示了对两种最先进的Android恶意软件检测方案MaMaDroid和Drebin的攻击。我们的结果表明,MaMaDroid中的恶意软件检测率从96%降低到0%,在Drebin中从97%降低到0%,只需将少量代码插入APK。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号