Disarming visualization-based approaches in malware detection systems

Publikation: Beitrag in FachzeitschriftArtikelForschungPeer-Review

Autoren

Organisationseinheiten

Externe Organisationen

  • Universita Mediterranea di Reggio Calabria
Forschungs-netzwerk anzeigen

Details

OriginalspracheEnglisch
Aufsatznummer103062
Seitenumfang13
FachzeitschriftComputers and Security
Jahrgang126
Frühes Online-Datum13 Dez. 2022
PublikationsstatusVeröffentlicht - März 2023

Abstract

Visualization-based approaches have recently been used in conjunction with signature-based techniques to detect variants of malware files. Indeed, it is sufficient to modify some byte of executable files to modify the signature and, thus, to elude a signature-based detector. In this paper, we design a GAN-based architecture that allows an attacker to generate variants of a malware in which the malware patterns found by visualization-based approaches are hidden, thus producing a new version of the malware that is not detected by both signature-based and visualization-based techniques. The experiments carried out on a well-known malware dataset show a success rate of 100% in generating new variants of malware files that are not detected from the state-of-the-art visualization-based technique.

ASJC Scopus Sachgebiete

Zitieren

Disarming visualization-based approaches in malware detection systems. / Saidia Fascí, Lara; Fisichella, Marco; Lax, Gianluca et al.
in: Computers and Security, Jahrgang 126, 103062, 03.2023.

Publikation: Beitrag in FachzeitschriftArtikelForschungPeer-Review

Saidia Fascí L, Fisichella M, Lax G, Qian C. Disarming visualization-based approaches in malware detection systems. Computers and Security. 2023 Mär;126:103062. Epub 2022 Dez 13. doi: 10.1016/j.cose.2022.103062, 10.1016/j.cose.2024.103934
Download
@article{4954a012cb8f4d4c8e3ddcbd6f178516,
title = "Disarming visualization-based approaches in malware detection systems",
abstract = "Visualization-based approaches have recently been used in conjunction with signature-based techniques to detect variants of malware files. Indeed, it is sufficient to modify some byte of executable files to modify the signature and, thus, to elude a signature-based detector. In this paper, we design a GAN-based architecture that allows an attacker to generate variants of a malware in which the malware patterns found by visualization-based approaches are hidden, thus producing a new version of the malware that is not detected by both signature-based and visualization-based techniques. The experiments carried out on a well-known malware dataset show a success rate of 100% in generating new variants of malware files that are not detected from the state-of-the-art visualization-based technique.",
keywords = "Deep learning, GAN, Machine learning, Malware classification",
author = "{Saidia Fasc{\'i}}, Lara and Marco Fisichella and Gianluca Lax and Chenyi Qian",
note = "Funding Information: This work was supported in part by the research project “SoBigData++” funded by the European Commission under the Horizon 2020 program with grant agreement number 871042 . ",
year = "2023",
month = mar,
doi = "10.1016/j.cose.2022.103062",
language = "English",
volume = "126",
journal = "Computers and Security",
issn = "0167-4048",
publisher = "Elsevier Ltd.",

}

Download

TY - JOUR

T1 - Disarming visualization-based approaches in malware detection systems

AU - Saidia Fascí, Lara

AU - Fisichella, Marco

AU - Lax, Gianluca

AU - Qian, Chenyi

N1 - Funding Information: This work was supported in part by the research project “SoBigData++” funded by the European Commission under the Horizon 2020 program with grant agreement number 871042 .

PY - 2023/3

Y1 - 2023/3

N2 - Visualization-based approaches have recently been used in conjunction with signature-based techniques to detect variants of malware files. Indeed, it is sufficient to modify some byte of executable files to modify the signature and, thus, to elude a signature-based detector. In this paper, we design a GAN-based architecture that allows an attacker to generate variants of a malware in which the malware patterns found by visualization-based approaches are hidden, thus producing a new version of the malware that is not detected by both signature-based and visualization-based techniques. The experiments carried out on a well-known malware dataset show a success rate of 100% in generating new variants of malware files that are not detected from the state-of-the-art visualization-based technique.

AB - Visualization-based approaches have recently been used in conjunction with signature-based techniques to detect variants of malware files. Indeed, it is sufficient to modify some byte of executable files to modify the signature and, thus, to elude a signature-based detector. In this paper, we design a GAN-based architecture that allows an attacker to generate variants of a malware in which the malware patterns found by visualization-based approaches are hidden, thus producing a new version of the malware that is not detected by both signature-based and visualization-based techniques. The experiments carried out on a well-known malware dataset show a success rate of 100% in generating new variants of malware files that are not detected from the state-of-the-art visualization-based technique.

KW - Deep learning

KW - GAN

KW - Machine learning

KW - Malware classification

UR - http://www.scopus.com/inward/record.url?scp=85144565578&partnerID=8YFLogxK

U2 - 10.1016/j.cose.2022.103062

DO - 10.1016/j.cose.2022.103062

M3 - Article

AN - SCOPUS:85144565578

VL - 126

JO - Computers and Security

JF - Computers and Security

SN - 0167-4048

M1 - 103062

ER -

Von denselben Autoren