SLIFER: Investigating performance and robustness of malware detection pipelines

Biggio, Battista;
2025-01-01

Abstract

As a result of decades of research, Windows malware detection is approached through a plethora of techniques. However, there is an ongoing mismatch between academia – which pursues an optimal performances in terms of detection rate and low false alarms – and the requirements of real-world scenarios. In particular, academia focuses on combining static and dynamic analysis within a single or ensemble of models, falling into several pitfalls like (i) firing dynamic analysis without considering the computational burden it requires; (ii) discarding impossible-to-analyze samples; and (iii) analyzing robustness against adversarial attacks without considering that malware detectors are complemented with more non-machine-learning components. Thus, in this paper we bridge these gaps, by investigating the properties of malware detectors built with multiple and different types of analysis. To do so, we develop SLIFER, a Windows malware detection pipeline sequentially leveraging both static and dynamic analysis, interrupting computations as soon as one module triggers an alarm, requiring dynamic analysis only when needed. Contrary to the state of the art, we investigate how to deal with samples that impede analyzes, showing how much they impact performances, concluding that it is better to flag them as legitimate to not drastically increase false alarms. Lastly, we perform a robustness evaluation of SLIFER. Counter-intuitively, the injection of new content is either blocked more by signatures than dynamic analysis, due to byte artifacts created by the attack, or it is able to avoid detection from signatures, as they rely on constraints on file size disrupted by attacks. As far as we know, we are the first to investigate the properties of sequential malware detectors, shedding light on their behavior in real production environment.
2025
2024
Inglese
150
104264
14
https://www.sciencedirect.com/science/article/pii/S0167404824005704
Esperti anonimi
internazionale
scientifica
Adversarial EXEmples; Machine learning; Malware detection; Pipeline; Robustness
no
Ponte, Andrea; Trizna, Dmitrijs; Demetrio, Luca; Biggio, Battista; Ogbu, Ivan Tesfai; Roli, Fabio
1.1 Articolo in rivista
info:eu-repo/semantics/article
1 Contributo su Rivista::1.1 Articolo in rivista
262
6
partially_open
Files in This Item:
File Size Format  
1-s2.0-S0167404824005704-main.pdf

Solo gestori archivio

Type: versione editoriale
Size 2.56 MB
Format Adobe PDF
2.56 MB Adobe PDF & nbsp; View / Open   Request a copy
ponte24-cose-aam.pdf

Open Access from 14/12/2025

Type: Author’s Accepted Manuscript AAM, Post-print, (version accepted by the publisher)
Size 740.99 kB
Format Adobe PDF
740.99 kB Adobe PDF View/Open

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Questionnaire and social

Share on:
Impostazioni cookie