Black-Box Adversarial Windows Malware Generation Via United Puppet-based Dropper and Genetic Algorithm

Shaohua Wang,Yong Fang,Yijia Xu,Yaxian Wang
DOI: https://doi.org/10.1109/hpcc-dss-smartcity-dependsys57074.2022.00113
2022-01-01
Abstract:The arms race for Windows PE malware evasion and detection is ongoing. Recently, researchers have found that learning-based detectors are vulnerable to the attacks of adversarial examples. Therefore, the study on the generation of adversarial PE malware is of great significance and practical value for enhancing existing detection mechanisms. Current adversarial PE malware generation methods have several problems: destroying original functions, low efficiency, poor stability, weak flexibility, poor stealthiness, and lack of universality. We proposed a new black-box adversarial PE malware generation framework. It uses a novel Dropper processing method based on a puppet file combined with a size-penalized and entropy-constrained genetic algorithm that can efficiently generate adversarial PE malware with highly stealthy and universality. Experiments proved that our method could escape the target detectors with an extremely high success rate. In the case of bypassing commercial engines, the adversarial malware escaped an average of 37.76 engines more than the original malware. In addition, the results showed that exploring the method of generating adversarial PE malware can reveal the weaknesses of a target detector and thus improve its defensive capabilities by conducting data poisoning and dataset augmentation experiments.
What problem does this paper attempt to address?