Instance attack: an explanation-based vulnerability analysis framework against DNNs for malware detection

View article
PeerJ Computer Science

Main article text

 

Introduction

  • We introduce the concept of the instance-based attack. Rather than training a surrogate model against the entire model, we instead train a surrogate model for an instance, with a specific emphasis on perturbing around that instance. The adversarial instances are generated by iteratively approximating the decision boundary.

  • Several prominent detection models are analyzed using a local interpretable model, their characteristics and drawbacks are highlighted. Notably, we observed a lack of focus on data section transformations within PE files, representing a significant gap in current approaches.

  • A novel functionality-preserving transformation method is proposed which is suitable for data sections in PE files that have not been evaluated by other authors.

  • The theoretical and mathematical foundations of our model are discussed.

  • Our method are tested in various scenarios, and the results demonstrate its superiority over other state-of-the-art approaches in black-box settings (Sharif et al., 2019). It can achieve a success rate of almost 100% in certain cases.

Technical approach

Instance attack

General framework

How interpretability is applied

Formalizing the model

Local linear explanations of malware detection

Data augmentation module and optimization algorithm

Data augmentation module

Interpretable data representations and segmentation algorithm

Fast least square method

Function invariant transformation

Evaluation

Datasets and malware detector

Weight analysis on superpixels

Distribution

Proportion of code segment weight

Randomly applied transformations

Evaluation of the transformations: Disp and DataDisp

Evaluation on explanation-based adversarial algorithm

Computational analysis

Miscellaneous

Hyperparameters

Integrity of binary

Discussion and future work

Discussion on experiments

Discussion on the model

Limitations and future works

Potential mitigations

Conclusions

Appendix

Windows portable executable file format

Additional Information and Declarations

Competing Interests

The authors declare that they have no competing interests.

Author Contributions

Ruijin Sun conceived and designed the experiments, performed the experiments, analyzed the data, performed the computation work, prepared figures and/or tables, authored or reviewed drafts of the article, and approved the final draft.

Shize Guo conceived and designed the experiments, prepared figures and/or tables, and approved the final draft.

Changyou Xing performed the experiments, authored or reviewed drafts of the article, and approved the final draft.

Yexin Duan analyzed the data, authored or reviewed drafts of the article, and approved the final draft.

Luming Yang analyzed the data, performed the computation work, prepared figures and/or tables, and approved the final draft.

Xi Guo performed the computation work, prepared figures and/or tables, authored or reviewed drafts of the article, and approved the final draft.

Zhisong Pan performed the computation work, authored or reviewed drafts of the article, and approved the final draft.

Data Availability

The following information was supplied regarding data availability:

The code is available at GitHub and Zenodo:

- https://github.com/iamawhalez/instanceattack.

- iamawhalez. (2023). iamawhalez/instanceattack: intanceattack (intanceattack). Zenodo. https://doi.org/10.5281/zenodo.8242650.

The data is available at Kaggle https://www.kaggle.com/c/malware-classification/data, and detail are described at https://arxiv.org/pdf/1802.10135.pdf.

Funding

This work was supported by the National Key R&D Plan: 2018YFB0805000. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.

782 Visitors 765 Views 35 Downloads

Your institution may have Open Access funds available for qualifying authors. See if you qualify

Publish for free

Comment on Articles or Preprints and we'll waive your author fee
Learn more

Five new journals in Chemistry

Free to publish • Peer-reviewed • From PeerJ
Find out more