Abstract
As an increasing number of deep-learning-based malware scanners have been proposed, the existing evasion techniques, including code obfuscation and polymorphic malware, are found to be less effective. In this work, we propose a reinforcement learning based semantics-preserving (i.e. functionality-preserving) attack against black-box GNNs (Graph Neural Networks) for malware detection. The key factor of adversarial malware generation via semantic Nops insertion is to select the appropriate semantic Nops and their corresponding basic blocks. The proposed attack uses reinforcement learning to automatically make these 'how to select' decisions. To evaluate the attack, we have trained two kinds of GNNs with three types (e.g., Backdoor, Trojan, and Virus) of Windows malware samples and various benign Windows programs. The evaluation results have shown that the proposed attack can achieve a significantly higher evasion rate than four baseline attacks, namely the binary diversification attack, the semantics-preserving random instruction insertion attack, the semantics-preserving accumulative instruction insertion attack, and the semantics-preserving gradient-based instruction insertion attack.
Original language | English (US) |
---|---|
Pages (from-to) | 1390-1402 |
Number of pages | 13 |
Journal | IEEE Transactions on Dependable and Secure Computing |
Volume | 20 |
Issue number | 2 |
DOIs | |
State | Published - Mar 1 2023 |
Externally published | Yes |
Keywords
- Adversarial samples generation
- graph neural networks
- malware detection
- reinforcement learning
ASJC Scopus subject areas
- General Computer Science
- Electrical and Electronic Engineering