Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3485730.3492867acmconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
poster

Are CNN based Malware Detection Models Robust?: Developing Superior Models using Adversarial Attack and Defense

Published: 15 November 2021 Publication History

Abstract

The tremendous increase of malicious applications in the android ecosystem has prompted researchers to explore deep learning based malware detection models. However, research in other domains suggests that deep learning models are adversarially vulnerable, and thus we aim to investigate the robustness of deep learning based malware detection models. We first developed two image-based E-CNN malware detection models based on android permission and intent. We then acted as an adversary and designed the ECO-FGSM evasion attack against the above models, which achieved more than 50% fooling rate with limited perturbations. The evasion attack converts maximum malware samples into adversarial samples while minimizing the perturbations and maintaining the sample's syntactical, functional, and behavioral integrity. Later, we used adversarial retraining to counter the evasion attack and develop adversarially superior malware detection models, which should be an essential step before any real-world deployment.

References

[1]
Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and harnessing adversarial examples. International Conference on Learning Representations (ICLR) (2015).
[2]
Hemant Rathore, Sanjay K Sahay, Piyush Nikam, and Mohit Sewak. 2020. Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning. Information Systems Frontiers (2020), 1--16.
[3]
Yanfang Ye, Tao Li, Donald Adjeroh, and S Sitharama Iyengar. 2017. A survey on malware detection using data mining techniques. ACM Computing Surveys (CSUR) 50, 3 (2017), 1--40.

Index Terms

  1. Are CNN based Malware Detection Models Robust?: Developing Superior Models using Adversarial Attack and Defense

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SenSys '21: Proceedings of the 19th ACM Conference on Embedded Networked Sensor Systems
    November 2021
    686 pages
    ISBN:9781450390972
    DOI:10.1145/3485730
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 November 2021

    Check for updates

    Author Tags

    1. Adversarial Learning
    2. Machine Learning
    3. Malware Analysis and Detection
    4. Smartphones

    Qualifiers

    • Poster
    • Research
    • Refereed limited

    Conference

    Acceptance Rates

    SenSys '21 Paper Acceptance Rate 25 of 139 submissions, 18%;
    Overall Acceptance Rate 174 of 867 submissions, 20%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 200
      Total Downloads
    • Downloads (Last 12 months)26
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 13 Nov 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media