Skip to main content

Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes

Publication ,  Conference
Lucas, K; Sharif, M; Bauer, L; Reiter, MK; Shintre, S
Published in: ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security
May 24, 2021

Motivated by the transformative impact of deep neural networks (DNNs) in various domains, researchers and anti-virus vendors have proposed DNNs for malware detection from raw bytes that do not require manual feature engineering. In this work, we propose an attack that interweaves binary-diversification techniques and optimization frameworks to mislead such DNNs while preserving the functionality of binaries. Unlike prior attacks, ours manipulates instructions that are a functional part of the binary, which makes it particularly challenging to defend against. We evaluated our attack against three DNNs in white-and black-box settings, and found that it often achieved success rates near 100%. Moreover, we found that our attack can fool some commercial anti-viruses, in certain cases with a success rate of 85%. We explored several defenses, both new and old, and identified some that can foil over 80% of our evasion attempts. However, these defenses may still be susceptible to evasion by attacks, and so we advocate for augmenting malware-detection systems with methods that do not rely on machine learning.

Duke Scholars

Altmetric Attention Stats
Dimensions Citation Stats

Published In

ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security

DOI

Publication Date

May 24, 2021

Start / End Page

744 / 758
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Lucas, K., Sharif, M., Bauer, L., Reiter, M. K., & Shintre, S. (2021). Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes. In ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security (pp. 744–758). https://doi.org/10.1145/3433210.3453086
Lucas, K., M. Sharif, L. Bauer, M. K. Reiter, and S. Shintre. “Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes.” In ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, 744–58, 2021. https://doi.org/10.1145/3433210.3453086.
Lucas K, Sharif M, Bauer L, Reiter MK, Shintre S. Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes. In: ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. 2021. p. 744–58.
Lucas, K., et al. “Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes.” ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, 2021, pp. 744–58. Scopus, doi:10.1145/3433210.3453086.
Lucas K, Sharif M, Bauer L, Reiter MK, Shintre S. Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes. ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. 2021. p. 744–758.

Published In

ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security

DOI

Publication Date

May 24, 2021

Start / End Page

744 / 758