Please use this identifier to cite or link to this item: https://elib.vku.udn.vn/handle/123456789/4305
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLuu, Nguyen Cong Minh-
dc.contributor.authorLe, Trong Nhan-
dc.contributor.authorTo, Trong Nghia-
dc.contributor.authorHoang, Khoa Nghi-
dc.contributor.authorPhan, The Duy-
dc.contributor.authorPham, Van Hau-
dc.date.accessioned2024-12-09T03:34:45Z-
dc.date.available2024-12-09T03:34:45Z-
dc.date.issued2024-11-
dc.identifier.isbn978-3-031-74126-5-
dc.identifier.urihttps://elib.vku.udn.vn/handle/123456789/4305-
dc.identifier.urihttps://doi.org/10.1007/978-3-031-74127-2_42-
dc.descriptionLecture Notes in Networks and Systems (LNNS,volume 882); The 13th Conference on Information Technology and Its Applications (CITA 2024) ; pp: 523-535.vi_VN
dc.description.abstractAs data driven-based Windows malware detectors become increasingly prevalent, the need for robust evaluation and enhancement of adversarial malware generation techniques also becomes imperative, as malicious actors will adapt and enhance their malware to evade detection. There are numerous works that introduce new techniques or enhancements for adversarial malware. One of these approaches is to leverage an iterative process, dynamically modifying adversarial malware with populations of injections based on feedback from a machine learning-based detector, aiming to enhance evasion capabilities through successive iterations. It is obvious that the effectiveness of a robust adversarial malware is influenced not only by the quality of the manipulation payload injected into the malware, but also by the capabilities and strength of the detector that interacts with the manipulated malware. In this paper, we introduce a multimodal approach to generate adversarial malware with robustness specifically fortified through the feedback of a deep learning (DL) detector with multiple modalities in the progress of adversaries generation. We evaluate the effectiveness of our approach in comparison to the implementation of conventional unimodal detectors such as MalConv in previous works with our proper adaptation in manipulation technique. We also consider the malware detection performance of the common antivirus platform VirusTotal with adversarial samples, and notably that the robust adversarial malware were able to evade up to average 3 detection programs more than the initial malware does.vi_VN
dc.language.isoenvi_VN
dc.publisherSpringer Naturevi_VN
dc.subjectMultimodal Deep Learning Feedback for Generating Evasive Malware Samples Against Malware Detectorvi_VN
dc.subjectWindows malware detectorsvi_VN
dc.subjectCommon antivirus platform VirusTotalvi_VN
dc.titleMultimodal Deep Learning Feedback for Generating Evasive Malware Samples Against Malware Detectorvi_VN
dc.typeWorking Papervi_VN
Appears in Collections:CITA 2024 (International)

Files in This Item:

 Sign in to read



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.