Explaining vulnerabilities of deep learning to adversarial malware binaries

Luca Demetrio;Battista Biggio;Fabio Roli;
2019-01-01

Abstract

Recent work has shown that deep-learning algorithms for malware detection are also susceptible to adversarial examples, i.e., carefully-crafted perturbations to input malware that enable misleading classification. Although this has questioned their suitability for this task, it is not yet clear why such algorithms are easily fooled also in this particular application domain. In this work, we take a first step to tackle this issue by leveraging explainable machine-learning algorithms developed to interpret the black-box decisions of deep neural networks. In particular, we use an explainable technique known as feature attribution to identify the most influential input features contributing to each decision, and adapt it to provide meaningful explanations to the classification of malware binaries. In this case, we find that a recently-proposed convolutional neural network does not learn any meaningful characteristic for malware detection from the data and text sections of executable files, but rather tends to learn to discriminate between benign and malware samples based on the characteristics found in the file header. Based on this finding, we propose a novel attack algorithm that generates adversarial malware binaries by only changing few tens of bytes in the file header. With respect to the other state-of-the-art attack algorithms, our attack does not require injecting any padding bytes at the end of the file, and it is much more efficient, as it requires manipulating much fewer bytes.
2019
Inglese
Proceedings of the Third Italian Conference on Cyber Security
Pierpaolo Degano, Roberto Zunino
2315
13
http://sunsite.informatik.rwth-aachen.de/Publications/CEUR-WS/#Vol-2315
http://ceur-ws.org/Vol-2315/paper09.pdf
3rd Italian Conference on Cyber Security, ITASEC 2019
Esperti anonimi
13-15 Febbraio 2019
Pisa, Italia
internazionale
scientifica
Computer Science - Cryptography and Security; Computer Science - Cryptography and Security
no
4 Contributo in Atti di Convegno (Proceeding)::4.1 Contributo in Atti di convegno
Demetrio, Luca; Biggio, Battista; Lagorio, Giovanni; Roli, Fabio; Armando, Alessandro
273
5
4.1 Contributo in Atti di convegno
open
info:eu-repo/semantics/conferencePaper
File in questo prodotto:
File Dimensione Formato  
Demetrio et al_CEUR 2019_paper09.pdf

accesso aperto

Descrizione: Conference paper
Tipologia: versione editoriale
Dimensione 986.07 kB
Formato Adobe PDF
986.07 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Questionario e social

Condividi su:
Impostazioni cookie