Please use this identifier to cite or link to this item:
https://elib.vku.udn.vn/handle/123456789/4305
Title: | Multimodal Deep Learning Feedback for Generating Evasive Malware Samples Against Malware Detector |
Authors: | Luu, Nguyen Cong Minh Le, Trong Nhan To, Trong Nghia Hoang, Khoa Nghi Phan, The Duy Pham, Van Hau |
Keywords: | Multimodal Deep Learning Feedback for Generating Evasive Malware Samples Against Malware Detector Windows malware detectors Common antivirus platform VirusTotal |
Issue Date: | Nov-2024 |
Publisher: | Springer Nature |
Abstract: | As data driven-based Windows malware detectors become increasingly prevalent, the need for robust evaluation and enhancement of adversarial malware generation techniques also becomes imperative, as malicious actors will adapt and enhance their malware to evade detection. There are numerous works that introduce new techniques or enhancements for adversarial malware. One of these approaches is to leverage an iterative process, dynamically modifying adversarial malware with populations of injections based on feedback from a machine learning-based detector, aiming to enhance evasion capabilities through successive iterations. It is obvious that the effectiveness of a robust adversarial malware is influenced not only by the quality of the manipulation payload injected into the malware, but also by the capabilities and strength of the detector that interacts with the manipulated malware. In this paper, we introduce a multimodal approach to generate adversarial malware with robustness specifically fortified through the feedback of a deep learning (DL) detector with multiple modalities in the progress of adversaries generation. We evaluate the effectiveness of our approach in comparison to the implementation of conventional unimodal detectors such as MalConv in previous works with our proper adaptation in manipulation technique. We also consider the malware detection performance of the common antivirus platform VirusTotal with adversarial samples, and notably that the robust adversarial malware were able to evade up to average 3 detection programs more than the initial malware does. |
Description: | Lecture Notes in Networks and Systems (LNNS,volume 882); The 13th Conference on Information Technology and Its Applications (CITA 2024) ; pp: 523-535. |
URI: | https://elib.vku.udn.vn/handle/123456789/4305 https://doi.org/10.1007/978-3-031-74127-2_42 |
ISBN: | 978-3-031-74126-5 |
Appears in Collections: | CITA 2024 (International) |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.