AIにより推定されたラベル
マルウェア検出手法 敵対的攻撃 限られたサンプルでのマルウェア検出
※ こちらのラベルはAIによって自動的に追加されました。そのため、正確でないことがあります。
詳細は文献データベースについてをご覧ください。
Abstract
We consider the problem of generating adversarial malware by a cyber-attacker where the attacker’s task is to strategically modify certain bytes within existing binary malware files, so that the modified files are able to evade a malware detector such as machine learning-based malware classifier. We have evaluated three recent adversarial malware generation techniques using binary malware samples drawn from a single, publicly available malware data set and compared their performances for evading a machine-learning based malware classifier called MalConv. Our results show that among the compared techniques, the most effective technique is the one that strategically modifies bytes in a binary’s header. We conclude by discussing the lessons learned and future research directions on the topic of adversarial malware generation.