Certifiably robust malware detectors by design
By: Pierre-Francois Gimenez, Sarath Sivaprasad, Mario Fritz
Potential Business Impact:
Stops bad computer programs from hiding.
Malware analysis involves analyzing suspicious software to detect malicious payloads. Static malware analysis, which does not require software execution, relies increasingly on machine learning techniques to achieve scalability. Although such techniques obtain very high detection accuracy, they can be easily evaded with adversarial examples where a few modifications of the sample can dupe the detector without modifying the behavior of the software. Unlike other domains, such as computer vision, creating an adversarial example of malware without altering its functionality requires specific transformations. We propose a new model architecture for certifiably robust malware detection by design. In addition, we show that every robust detector can be decomposed into a specific structure, which can be applied to learn empirically robust malware detectors, even on fragile features. Our framework ERDALT is based on this structure. We compare and validate these approaches with machine-learning-based malware detection methods, allowing for robust detection with limited reduction of detection performance.
Similar Papers
DeepTrust: Multi-Step Classification through Dissimilar Adversarial Representations for Robust Android Malware Detection
Cryptography and Security
Stops bad apps from tricking phone security.
Evaluating the Robustness of Adversarial Defenses in Malware Detection Systems
Cryptography and Security
Makes phone virus checkers easier to trick.
Efficient Adversarial Malware Defense via Trust-Based Raw Override and Confidence-Adaptive Bit-Depth Reduction
Cryptography and Security
Makes malware detectors faster and safer.