ABSTRACT
Android-based smartphones and IoT devices have grown at an exponential rate in the last decade. Meanwhile, malicious applications have also increased dramatically, which threaten the Android ecosystem. The anti-malware community has proposed data mining based malware detection models which have shown encouraging results. However, these detection models are vulnerable to adversarial attacks. In this work, we first acted as an adversary and performed adversarial attacks on eight different malware detection models. We found all the eight detection models vulnerable to adversarial attacks and fooling rate of more than 90% was achieved against each of them. We also propose defence against these attacks by adversarial retraining and accomplish encouraging results to improve the overall robustness of malware detection models.
- Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, and Konrad Rieck. 2014. Drebin: Effective and explainable detection of android malware in your pocket.. In NDSS, Vol. 14. 23--26.Google Scholar
- Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. (ICLR) arXiv preprint arXiv:1412.6572 (2014).Google Scholar
- Sandy Huang, Nicolas Papernot, Ian Goodfellow, Yan Duan, and Pieter Abbeel. 2017. Adversarial attacks on neural network policies. ICLR (2017).Google Scholar
- Jin Li, Lichao Sun, Qiben Yan, Zhiqiang Li, Witawas Srisa-An, and Heng Ye. 2018. Significant permission identification for machine-learning-based android malware detection. IEEE Transactions on Industrial Informatics 14, 7 (2018), 3216--3225.Google Scholar
Cross Ref
- Mohit Sewak, Sanjay K Sahay, and Hemant Rathore. 2020. DOOM: a novel adversarial-DRL-based op-code level metamorphic malware obfuscator for the enhancement of IDS. In ACM UbiComp. 131--134.Google Scholar
- Ke Xu, Yingjiu Li, and Robert H Deng. 2016. Iccdetector: Icc-based malware detection on android. IEEE TIFS 11, 6 (2016), 1252--1264.Google Scholar
- Yanfang Ye, Tao Li, Donald Adjeroh, and S Sitharama Iyengar. 2017. A survey on malware detection using data mining techniques. ACM Computing Surveys (CSUR) 50, 3 (2017), 1--40.Google Scholar
Digital Library
Index Terms
How robust are malware detection models for Android smartphones against adversarial attacks?: poster abstract
Recommendations
Are CNN based Malware Detection Models Robust?: Developing Superior Models using Adversarial Attack and Defense
SenSys '21: Proceedings of the 19th ACM Conference on Embedded Networked Sensor SystemsThe tremendous increase of malicious applications in the android ecosystem has prompted researchers to explore deep learning based malware detection models. However, research in other domains suggests that deep learning models are adversarially ...
Robust Android Malware Detection against Adversarial Example Attacks
WWW '21: Proceedings of the Web Conference 2021Adversarial examples pose severe threats to Android malware detection because they can render the machine learning based detection systems useless. How to effectively detect Android malware under various adversarial example attacks becomes an essential ...
Designing Adversarial Robust and Explainable Malware Detection System for Android based Smartphones: PhD Forum Abstract
IPSN '21: Proceedings of the 20th International Conference on Information Processing in Sensor Networks (co-located with CPS-IoT Week 2021)Android smartphones and malware have grown exponentially in the last decade. Literature suggests that the current malware detection systems cannot cope with the present security challenges. Thus researchers are developing next-generation malware ...





Comments