Alert button

Evading Malware Classifiers via Monte Carlo Mutant Feature Discovery

Add code
Alert button
Jun 15, 2021
Figure 1 for Evading Malware Classifiers via Monte Carlo Mutant Feature Discovery
Figure 2 for Evading Malware Classifiers via Monte Carlo Mutant Feature Discovery
Figure 3 for Evading Malware Classifiers via Monte Carlo Mutant Feature Discovery
Figure 4 for Evading Malware Classifiers via Monte Carlo Mutant Feature Discovery

Share this with someone who'll enjoy it:

The use of Machine Learning has become a significant part of malware detection efforts due to the influx of new malware, an ever changing threat landscape, and the ability of Machine Learning methods to discover meaningful distinctions between malicious and benign software. Antivirus vendors have also begun to widely utilize malware classifiers based on dynamic and static malware analysis features. Therefore, a malware author might make evasive binary modifications against Machine Learning models as part of the malware development life cycle to execute an attack successfully. This makes the studying of possible classifier evasion strategies an essential part of cyber defense against malice. To this extent, we stage a grey box setup to analyze a scenario where the malware author does not know the target classifier algorithm, and does not have access to decisions made by the classifier, but knows the features used in training. In this experiment, a malicious actor trains a surrogate model using the EMBER-2018 dataset to discover binary mutations that cause an instance to be misclassified via a Monte Carlo tree search. Then, mutated malware is sent to the victim model that takes the place of an antivirus API to test whether it can evade detection.

* Presented at the Malware Technical Exchange Meeting, Online,2021. Copyright 2021 by the author(s)  

Share this with someone who'll enjoy it: