论文标题

对抗窗户恶意软件的功能性提供功能性的黑盒优化

Functionality-preserving Black-box Optimization of Adversarial Windows Malware

论文作者

Demetrio, Luca, Biggio, Battista, Lagorio, Giovanni, Roli, Fabio, Armando, Alessandro

论文摘要

基于机器学习的Windows恶意软件探测器也容易受到对抗示例的影响,即使仅给予攻击者对模型的访问。这些攻击的主要缺点是:(i)它们是查询性的,因为它们依赖于迭代地将随机转换应用于输入恶意软件; (ii)它们还可能需要在优化过程的每个迭代时在沙箱中执行对抗性恶意软件,以确保保留其侵入性功能。在本文中,我们通过呈现一个新颖的黑盒攻击家族来克服这些问题,这些攻击既疑问又具有功能性,因为它们依靠注入良性含量的注入(将永远不会执行)在恶意文件的末尾,或者在某些新创建的部分中。我们的攻击被形式化为一个约束的最小化问题,这也能够优化逃避检测的概率与注入有效载荷的大小之间的权衡。我们在两个流行的静态Windows恶意软件探测器上进行了经验调查这一权衡,并表明我们的黑盒攻击只能以很少的查询和小有效载荷绕过它们,即使它们仅返回预测的标签。我们还评估了我们的攻击转移到其他商业防病毒解决方案中是否转移,并且出人意料地发现它们平均可以逃避12个以上的商用防病毒发动机。我们通过讨论方法的局限性以及基于动态分析的针对恶意软件分类器的未来扩展来得出结论。

Windows malware detectors based on machine learning are vulnerable to adversarial examples, even if the attacker is only given black-box query access to the model. The main drawback of these attacks is that: (i) they are query-inefficient, as they rely on iteratively applying random transformations to the input malware; and (ii) they may also require executing the adversarial malware in a sandbox at each iteration of the optimization process, to ensure that its intrusive functionality is preserved. In this paper, we overcome these issues by presenting a novel family of black-box attacks that are both query-efficient and functionality-preserving, as they rely on the injection of benign content - which will never be executed - either at the end of the malicious file, or within some newly-created sections. Our attacks are formalized as a constrained minimization problem which also enables optimizing the trade-off between the probability of evading detection and the size of the injected payload. We empirically investigate this trade-off on two popular static Windows malware detectors, and show that our black-box attacks can bypass them with only few queries and small payloads, even when they only return the predicted labels. We also evaluate whether our attacks transfer to other commercial antivirus solutions, and surprisingly find that they can evade, on average, more than 12 commercial antivirus engines. We conclude by discussing the limitations of our approach, and its possible future extensions to target malware classifiers based on dynamic analysis.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源