核心概念
The author proposes a novel approach of injecting code caves within Windows PE malware files to evade detection, preserving functionality with a code loader.
摘要
The content discusses the challenges of adversarial evasion attacks on Windows PE malware and introduces a novel method of injecting code caves within sections to evade detection while maintaining functionality. The experiments show impressive evasion rates using gradient descent and FGSM algorithms targeting popular CNN-based malware detectors.
The study analyzes the effectiveness of different attack approaches, including append attacks and intra-section attacks in .text, .data, and .rdata sections. Results demonstrate higher evasion rates with intra-section attacks compared to append attacks against MalConv and MalConv2 models. Additionally, confidence reduction in malware detectors is observed after injecting perturbations in different sections.
Key points include the importance of section sizes in determining the feasibility of injecting code caves, the impact of perturbation size on evasion rates, and the linear relationship between them. The study highlights the significance of preserving functionality while evading detection in adversarial attacks on Windows PE malware files.
統計資料
Our experimental analysis yielded an evasion rate of 92.31% with gradient descent and 96.26% with FGSM when targeting MalConv.
In the case of an attack against MalConv2, our approach achieved a remarkable maximum evasion rate of 97.93% with gradient descent and 94.34% with FGSM.
The attack on the .text section gave an evasion rate as high as 63.45% against MalConv and 97.93% against MalConv2 with 15% perturbation.
The attacks on the .data section yielded an evasion rate of up to 69.77% against MalConv and 54.76% against MalConv2 with 15% perturbation.
引述
"In addition, our approach also resolves the challenge of preserving the functionality and executability of malware during modification."
"Our experimental analysis yielded impressive results, achieving an evasion rate of 92.31% with gradient descent and 96.26% with FGSM when targeting MalConv."
"The proposed approach achieved a remarkable maximum evasion rate of 97.93% with gradient descent and 94.34% with FGSM when targeting MalConv2."