Please use this identifier to cite or link to this item: https://elib.vku.udn.vn/handle/123456789/4305
Title: Multimodal Deep Learning Feedback for Generating Evasive Malware Samples Against Malware Detector
Authors: Luu, Nguyen Cong Minh
Le, Trong Nhan
To, Trong Nghia
Hoang, Khoa Nghi
Phan, The Duy
Pham, Van Hau
Keywords: Multimodal Deep Learning Feedback for Generating Evasive Malware Samples Against Malware Detector
Windows malware detectors
Common antivirus platform VirusTotal
Issue Date: Nov-2024
Publisher: Springer Nature
Abstract: As data driven-based Windows malware detectors become increasingly prevalent, the need for robust evaluation and enhancement of adversarial malware generation techniques also becomes imperative, as malicious actors will adapt and enhance their malware to evade detection. There are numerous works that introduce new techniques or enhancements for adversarial malware. One of these approaches is to leverage an iterative process, dynamically modifying adversarial malware with populations of injections based on feedback from a machine learning-based detector, aiming to enhance evasion capabilities through successive iterations. It is obvious that the effectiveness of a robust adversarial malware is influenced not only by the quality of the manipulation payload injected into the malware, but also by the capabilities and strength of the detector that interacts with the manipulated malware. In this paper, we introduce a multimodal approach to generate adversarial malware with robustness specifically fortified through the feedback of a deep learning (DL) detector with multiple modalities in the progress of adversaries generation. We evaluate the effectiveness of our approach in comparison to the implementation of conventional unimodal detectors such as MalConv in previous works with our proper adaptation in manipulation technique. We also consider the malware detection performance of the common antivirus platform VirusTotal with adversarial samples, and notably that the robust adversarial malware were able to evade up to average 3 detection programs more than the initial malware does.
Description: Lecture Notes in Networks and Systems (LNNS,volume 882); The 13th Conference on Information Technology and Its Applications (CITA 2024) ; pp: 523-535.
URI: https://elib.vku.udn.vn/handle/123456789/4305
https://doi.org/10.1007/978-3-031-74127-2_42
ISBN: 978-3-031-74126-5
Appears in Collections:CITA 2024 (International)

Files in This Item:

 Sign in to read



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.