Adversarial malware binaries: Evading deep learning for malware detection in executables

  • Bojan Kolosnjaji
  • , Ambra Demontis
  • , Battista Biggio
  • , Davide Maiorca
  • , Giorgio Giacinto
  • , Claudia Eckert
  • , Fabio Roli

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

275 Scopus citations

Abstract

Machine learning has already been exploited as a useful tool for detecting malicious executable files. Data retrieved from malware samples, such as header fields, instruction sequences, or even raw bytes, is leveraged to learn models that discriminate between benign and malicious software. However, it has also been shown that machine learning and deep neural networks can be fooled by evasion attacks (also known as adversarial examples), i.e., small changes to the input data that cause misclassification at test time. In this work, we investigate the vulnerability of malware detection methods that use deep networks to learn from raw bytes. We propose a gradient-based attack that is capable of evading a recently-proposed deep network suited to this purpose by only changing few specific bytes at the end of each malware sample, while preserving its intrusive functionality. Promising results show that our adversarial malware binaries evade the targeted network with high probability, even though less than 1% of their bytes are modified.

Original languageEnglish
Title of host publication2018 26th European Signal Processing Conference, EUSIPCO 2018
PublisherEuropean Signal Processing Conference, EUSIPCO
Pages533-537
Number of pages5
ISBN (Electronic)9789082797015
DOIs
StatePublished - 29 Nov 2018
Event26th European Signal Processing Conference, EUSIPCO 2018 - Rome, Italy
Duration: 3 Sep 20187 Sep 2018

Publication series

NameEuropean Signal Processing Conference
Volume2018-September
ISSN (Print)2219-5491

Conference

Conference26th European Signal Processing Conference, EUSIPCO 2018
Country/TerritoryItaly
CityRome
Period3/09/187/09/18

Fingerprint

Dive into the research topics of 'Adversarial malware binaries: Evading deep learning for malware detection in executables'. Together they form a unique fingerprint.

Cite this