Generic black-box end-to-end attack against state of the art API call based malware classifiers

151Citations
Citations of this article
176Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we present a black-box attack against API call based machine learning malware classifiers, focusing on generating adversarial sequences combining API calls and static features (e.g., printable strings) that will be misclassified by the classifier without affecting the malware functionality. We show that this attack is effective against many classifiers due to the transferability principle between RNN variants, feed forward DNNs, and traditional machine learning classifiers such as SVM. We also implement GADGET, a software framework to convert any malware binary to a binary undetected by malware classifiers, using the proposed attack, without access to the malware source code.

Cite

CITATION STYLE

APA

Rosenberg, I., Shabtai, A., Rokach, L., & Elovici, Y. (2018). Generic black-box end-to-end attack against state of the art API call based malware classifiers. In Lecture Notes in Computer Science (Vol. 11050 LNCS, pp. 490–510). Springer Verlag. https://doi.org/10.1007/978-3-030-00470-5_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free