Considering the weaknesses of signature-based approaches adopted by current antimalware, from both academic and industrial side there is a boost in the development of techniques exploiting artificial intelligence, where one of the most promising are based on the representation of application under analysis as image. In order to understand whether these approaches can be effectively adopted in the real-world, starting from a detector based on deep learning, in this paper we evaluate the resilience of these approaches when morphed samples are considered. We present DexWave, a tool aimed to automatically inject perturbations techniques targeting the smali code representation of Android applications. The experimental analysis demonstrate that image-based malware classifier are vulnerable to simple perturbations attack.

Perturbation of Image-based Malware Detection with Smali level morphing techniques

Santone A.;Mercaldo F.
2021-01-01

Abstract

Considering the weaknesses of signature-based approaches adopted by current antimalware, from both academic and industrial side there is a boost in the development of techniques exploiting artificial intelligence, where one of the most promising are based on the representation of application under analysis as image. In order to understand whether these approaches can be effectively adopted in the real-world, starting from a detector based on deep learning, in this paper we evaluate the resilience of these approaches when morphed samples are considered. We present DexWave, a tool aimed to automatically inject perturbations techniques targeting the smali code representation of Android applications. The experimental analysis demonstrate that image-based malware classifier are vulnerable to simple perturbations attack.
2021
978-1-6654-3574-1
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11695/107202
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 2
  • ???jsp.display-item.citation.isi??? ND
social impact