SHORT NOTE REGARDING BLACKBOX ANDROID MALWARE DETECTION USING MACHINE LEARNING AND EVASION ATTACKS TECHNIQUES

Автор: Razvan Bocu
Организация: Transilvania University of Brasov

Категория:

Ключевые слова: Blackbox Malware Detection, Android, Machine Learning, Evasion Attacks, Android APK Decompilation
Аннотация. Over the past ten years, researchers have extensively explored the vulnerability of Android malware detectors to adversarial examples through the development of evasion attacks. Nevertheless, the feasibility of these attacks in real-world use case scenarios is debatable. Most of the existing published papers are based on the assumptions that the attackers know the details of the target classifiers used for malware detection. Nevertheless, in reality, malicious actors have limited access to the target classifiers. This proposed talk presents a problem-space adversarial attack designed to effectively evade blackbox Android malware detectors in real-world use case scenarios. The proposed approach constructs a collection of problem-space transformations derived from benign donors that share opcode-level similarity with malware applications through the consideration of an n-gram-based approach. These transformations are then used to present malware instances as legitimate entities through an iterative and incremental manipulation strategy. The proposed presentation will describe a manipulation model that is based on a query-efficient optimization algorithm, which can identify and implement the required sequences of transformations into the malware applications. The model has already been evaluated relative to more than 1,000 malware applications. This demonstrates the effectiveness of the reported approach relative to the generation of real-world adversarial examples in both software and hardware-related scenarios. The experiments that we conducted demonstrate that the proposed model may effectively trick various malware detectors into believing that malware entities are legitimate. More precisely, the proposed model generates evasion rates of 90%–95% relative to data sets like DREBIN, Sec-SVM, ADE-MA, MaMaDroid, and Opcode-SVM. The average number of required computational operations belongs to the range [1..7]. Additionally, it is relevant to note that the proposed adversarial attack preserves its stealthiness against the virus detection core of three popular commercial antivirus software applications. The obtained evasion rate is 87%, which further proves the proposed model’s relevance for real-world use case scenarios.

Библиография:

Yousra Aafer, Wenliang Du, and Heng Yin, “DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android,” in Springer eBooks, 2013, 86–103, https://doi.org/10.1007/978-3-319-04283-1_6.
“Can Machine/Deep Learning Classifiers Detect Zero-Day Malware With High Accuracy?,” IEEE Conference Publication | IEEE Xplore, December 1, 2019, https://ieeexplore.ieee.org/document/9006514
Cara, Fabrizio, Michele Scalas, Giorgio Giacinto, and Davide Maiorca. 2020. "On the Feasibility of Adversarial Sample Creation Using the Android System API" Information 11, no. 9: 433. https://doi.org/10.3390/info11090433
“DroidEye: Fortifying Security of Learning-Based Classifier Against Adversarial Android Malware Attacks,” IEEE Conference Publication | IEEE Xplore, August 1, 2018, https://ieeexplore.ieee.org/document/8508284
Francesco Croce et al., “Sparse-RS: A Versatile Framework for Query-Efficient Sparse Black-Box Adversarial Attacks,” Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 6 (June 28, 2022): 6437–45, https://doi.org/10.1609/aaai.v36i6.20595
“Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection,” IEEE Journals & Magazine | IEEE Xplore, August 1, 2019, https://ieeexplore.ieee.org/abstract/document/7917369
“Malware Detection and Classification Based on N-Grams Attribute Similarity,” IEEE Conference Publication | IEEE Xplore, July 1, 2017, https://ieeexplore.ieee.org/document/8005908
“Program Slicing,” IEEE Journals & Magazine | IEEE Xplore, July 1, 1984, https://ieeexplore.ieee.org/abstract/document/5010248
“ShadowDroid: Practical Black-box Attack Against ML-based Android Malware Detection,” IEEE Conference Publication | IEEE Xplore, December 1, 2021, https://ieeexplore.ieee.org/document/9763777
Jinrong Bai, Junfeng Wang, and Guozhong Zou, “A Malware Detection Scheme Based on Mining Format Information,” The Scientific World JOURNAL 2014 (January 1, 2014): 1–11, https://doi.org/10.1155/2014/260905
Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck, „DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket“, 2014, https://media.telefonicatech.com/telefonicatech/uploads/2021/1/4915_2014-ndss.pdf
AndroZoo. Available online: https://androzoo.uni.lu/ , (Accessed: 7 November 2024).
VirusTotal. Available online: https://www.virustotal.com/gui/home/upload , (Accessed: 7 November 2024).
Fabrício Ceschin, Marcus Botacin, Heitor Murilo Gomes, Luiz S. Oliveira, and André Grégio. 2020. Shallow Security: on the Creation of Adversarial Variants to Evade Machine Learning-Based Malware Detectors. In Proceedings of the 3rd Reversing and Offensive-oriented Trends Symposium (ROOTS'19). Association for Computing Machinery, New York, NY, USA, Article 4, 1–9. https://doi.org/10.1145/3375894.3375898