The content discusses the challenges of adversarial evasion attacks on Windows PE malware and introduces a novel method of injecting code caves within sections to evade detection while maintaining functionality. The experiments show impressive evasion rates using gradient descent and FGSM algorithms targeting popular CNN-based malware detectors.
The study analyzes the effectiveness of different attack approaches, including append attacks and intra-section attacks in .text, .data, and .rdata sections. Results demonstrate higher evasion rates with intra-section attacks compared to append attacks against MalConv and MalConv2 models. Additionally, confidence reduction in malware detectors is observed after injecting perturbations in different sections.
Key points include the importance of section sizes in determining the feasibility of injecting code caves, the impact of perturbation size on evasion rates, and the linear relationship between them. The study highlights the significance of preserving functionality while evading detection in adversarial attacks on Windows PE malware files.
他の言語に翻訳
原文コンテンツから
arxiv.org
深掘り質問