169
Views
0
CrossRef citations to date
0
Altmetric
Articles

Anti-malware engines under adversarial attacks

ORCID Icon & ORCID Icon
Pages 791-804 | Received 09 Jul 2020, Accepted 04 Jun 2021, Published online: 20 Jun 2021

References

  • Christodorescu M, Jha S. Static analysis of executables to detect malicious patterns. Technical report. Wisconsin Univ-Madison Dept Of Computer Sciences; 2006.
  • Balakrishnan A, Schulze C. Code obfuscation literature survey. CS701 Construction of compilers. 19; 2005.
  • Or-Meir O, Nissim N, Elovici Y, et al. Dynamic malware analysis in the modern era state of the art survey. ACM Comput Surv (CSUR). 2019;52(5):1–48.
  • Aquilina. Cross-platform malware contamination [master’s thesis]. Royal Holloway, University of London; 2015.
  • Han W, Xue J, Wang Y, et al. Maldae: detecting and explaining malware based on correlation and fusion of static and dynamic characteristics. Comput Secur. 2019;83:208–233.
  • Moser A, Kruegel C, Kirda E. Limits of static analysis for malware detection. Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007); IEEE; 2007. p. 421–430.
  • Gibert D, Mateu C, Planes J. The rise of machine learning for detection and classification of malware: research developments, trends and challenges. J Netw Comput Appl. 2020;153:102526.
  • Singh G, Khare N. A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques. Int J Comput Appl. 2021;43:1–11.
  • Singh J, Singh J. Assessment of supervised machine learning algorithms using dynamic API calls for malware detection. Int J Comput Appl. 2020;43:1–8.
  • Mcafee. evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study. 2019. Available from: https://www.mcafee.com/blogs/other-blogs/mcafee-labs/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study/
  • Sophos. sophos-adds-deep-learning-capabilities. 2019. Available from: https://www.sophos.com/en-us/press-office/press-releases/2017/11/sopho-sadds-deep-learning-capabilities-to-intercept-x-early-access-program.aspx
  • Biggio B, Roli F. Wild patterns: ten years after the rise of adversarial machine learning. Pattern Recognit. 2018;84:317–331.
  • Carlini N, Wagner D. Towards evaluating the robustness of neural networks. 2017 IEEE symposium on security and privacy (sp); IEEE; 2017. p. 39–57.
  • Chakraborty A, Alam M, Dey V, et al. Adversarial attacks and defences: a survey; 2018. preprint arXiv:1810.00069..
  • Goodfellow IJ, Shlens J, Szegedy C. Explaining and harnessing adversarial examples; 2014. preprint arXiv:1412.6572.
  • Papernot N, McDaniel P, Sinha A, et al. Towards the science of security and privacy in machine learning; 2016. preprint arXiv:1611.03814.
  • Yuan X, He P, Zhu Q, et al. Adversarial examples: attacks and defenses for deep learning. IEEE Trans Neural Netw Learn Syst. 2019;30(9):2805–2824.
  • Papernot N, McDaniel P, Jha S, et al. The limitations of deep learning in adversarial settings. 2016 IEEE European symposium on security and privacy (EuroS&P); IEEE; 2016. p. 372–387.
  • Chen L, Hou S, Ye Y. Securedroid: enhancing security of machine learning-based detection against adversarial android malware attacks. Proceedings of the 33rd Annual Computer Security Applications Conference; 2017. p. 362–372.
  • Chen L, Hou S, Ye Y, et al. Droideye: fortifying security of learning-based classifier against adversarial android malware attacks. 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM); IEEE; 2018. p. 782–789.
  • Demontis A, Melis M, Biggio B, et al. Yes, machine learning can be more secure! A case study on android malware detection. IEEE Trans Depend Secure Comput. 2017;16:711–724.
  • Grosse K, Papernot N, Manoharan P, et al. Adversarial examples for malware detection. European Symposium on Research in Computer Security; Springer; 2017. p. 62–79.
  • Suciu O, Coull SE, Johns J. Exploring adversarial examples in malware detection. 2019 IEEE Security and Privacy Workshops (SPW); IEEE; 2019. p 8–14.
  • Al-Dujaili A, Huang A, Hemberg E, et al. Adversarial deep learning for robust detection of binary encoded malware. 2018. preprint arXiv:1801.02950.
  • Hu W, Tan Y. Generating adversarial malware examples for black-box attacks based on gan. 2017. preprint arXiv:1702.05983.
  • Wagner D, Soto P. Mimicry attacks on host-based intrusion detection systems. Proceedings of the 9th ACM Conference on Computer and Communications Security; 2002. p. 255–264.
  • Lowd D, Meek C. Good word attacks on statistical spam filters. CEAS 2005; 2005.
  • Dahl GE, Stokes JW, Deng L, et al. Large-scale malware classification using random projections and neural networks. 2013 IEEE International Conference on Acoustics, Speech and Signal Processing; IEEE; 2013. p. 3422–3426.
  • Saxe J, Berlin K. Deep neural network based malware detection using two dimensional binary program features. 2015 10th International Conference on Malicious and Unwanted Software (MALWARE); IEEE; 2015. p. 11–20.
  • Han Q, Subrahmanian VS, Xiong Y. Android malware detection via (somewhat) robust irreversible feature transformations. IEEE Trans Inf Forens Secur. 2020;15:3511–3525.
  • Goodfellow I, Pouget-Abadie J, Mirza M, et al. Generative adversarial nets. Adv Neural Inf Process Syst. 2014;27:2672–2680.
  • Arp D, Spreitzenbarth M, Hubner M, et al. Drebin: effective and explainable detection of android malware in your pocket. Ndss. 2014;14:23–26.
  • ibotpeaches. ibotpeaches. 2019. Available from: https://ibotpeaches.github.io/Apktool/
  • Wiener E, Pedersen JO, Weigend AS. et al A neural network approach to topic spotting. Proceedings of SDAIR-95, 4th annual symposium on document analysis and information retrieval; Vol. 317, Las Vegas, NV: 1995. p. 332.
  • Fernanda Caropreso M, Matwin S, Sebastiani F. A learner-independent evaluation of the usefulness of statistical phrases for automated text categorization. Text Databases Document Manage Theory Pract. 2001;5478:78–102.
  • Galavotti L, Sebastiani F, Simi M. Experiments on the use of feature selection and negative evidence in automated text categorization. International Conference on Theory and Practice of Digital Libraries; Springer; 2000. p. 59–68.
  • Largeron C, Moulin C, Géry M. Entropy based feature selection for text categorization. Proceedings of the 2011 ACM Symposium on Applied Computing; 2011. p. 924–928.
  • Cleverhans. security. 2019. Available from: http://www.cleverhans.io/security/privacy/ml/2016/12/16/breaking-things-is-easy.html
  • Samangouei P, Kabkab M, Chellappa R. Defense-gan: protecting classifiers against adversarial attacks using generative models; 2018. preprint arXiv:1805.06605.
  • Xu W, Evans D, Qi Y. Feature squeezing detecting adversarial examples in deep neural networks; 2017. preprint arXiv:1704.01155 .
  • Meng D, Chen H. Magnet: a two-pronged defense against adversarial examples. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security; 2017. p. 135–147.
  • Dang H, Huang Y, Chang E-C. Evading classifiers by morphing in the dark. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security; 2017. p. 119–133.
  • Íncer Romeo Í, Theodorides M, Afroz S, et al. Adversarially robust malware detection using monotonic classification. Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics; 2018. p. 54–63.
  • Li D, Li Q, Ye Y, et al. Enhancing deep neural networks against adversarial malware examples; 2020. preprint arXiv:2004.07919.
  • Wang Q, Guo W, Zhang K, et al. Adversary resistant deep neural networks with an application to malware detection. Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; 2017. p. 1145–1153.
  • Yang W, Kong D, Xie T, et al. Malware detection in adversarial settings: exploiting feature evolutions and confusions in android apps. Proceedings of the 33rd Annual Computer Security Applications Conference; 2017. p. 288–302.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.