Visible to the public Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable BytesConflict Detection Enabled

TitleMalware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes
Publication TypeConference Proceedings
Year of Publication2021
AuthorsLucas, Keane, Sharif, Mahmood, Bauer, Lujo, Reiter, Michael K., Shintre, Saurabh
Conference NameASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security
Date Published06/2021
Keywords2021: July, CMU
AbstractMotivated by the transformative impact of deep neural networks (DNNs) in various domains, researchers and anti-virus vendors have proposed DNNs for malware detection from raw bytes that do not require manual feature engineering. In this work, we propose an attack that interweaves binary-diversification techniques and optimization frameworks to mislead such DNNs while preserving the functionality of binaries. Unlike prior attacks, ours manipulates instructions that are a functional part of the binary, which makes it particularly challenging to defend against. We evaluated our attack against three DNNs in white- and black-box settings, and found that it often achieved success rates near 100%. Moreover, we found that our attack can fool some commercial anti-viruses, in certain cases with a success rate of 85%. We explored several defenses, both new and old, and identified some that can foil over 80% of our evasion attempts. However, these defenses may still be susceptible to evasion by attacks, and so we advocate for augmenting malware-detection systems with methods that do not rely on machine learning.
DOIdoi.org/10.1145/3433210.3453086
Citation Keynode-81244

Other available formats:

Lucas_Malware_Makeover_Bauer.pdf
AttachmentTaxonomyKindSize
Lucas_Malware_Makeover_Bauer.pdfPDF document1.67 MBDownloadPreview
AttachmentSize
bytes