AAGAN: Android Malware Generation System Based on Generative Adversarial Network

2Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the rapid evolution of mobile malware, especially Android malware, machine learning (ML)-based Android malware detection systems have drawn massive attention. Although ML algorithms have recently led to many vital breakthroughs in malware detection, they are still particularly vulnerable to adversarial example (AE) attacks. By applying small random perturbations (e.g. simply modifying different kinds of features from the application's manifest file), an AE attack can cause the misclassification of legitimate applications. This paper proposes AAGAN, an automated Android malware generation system based on Generative Adversarial Networks (GAN) that can successfully deceive current ML detectors. Our experiment results indicate that AEs generated by our system can flip the prediction of the state-of-the-art detection algorithms in 99% of cases using a real-world dataset. To defend against AE attacks, we improve the robustness of our detection system by alternatively retraining with these newly generated AEs. Surprisingly, after retraining five times, AAGAN can achieve an 89% success rate in bypassing our malware detection system.

Cite

CITATION STYLE

APA

Trung, D. M., Khoa, N. H., Duy, P. T., Pham, V. H., & Cam, N. T. (2024). AAGAN: Android Malware Generation System Based on Generative Adversarial Network. Vietnam Journal of Computer Science, 11(2), 275–299. https://doi.org/10.1142/S2196888824500039

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free