4.5 Article

Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach

期刊

COMPUTERS & SECURITY
卷 73, 期 -, 页码 326-344

出版社

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2017.11.007

关键词

Malware detection; Adversarial machine learning; Poisoning attacks; Manipulation; KUAFUDET

资金

  1. National Natural Science Foundation of China [61502170, 61272444, 61411146001, U1401253, U1405251]
  2. Science and Technology Commission of Shanghai Municipality [13ZR1413000]

向作者/读者索取更多资源

The evolution of mobile malware poses a serious threat to smartphone security. Today, sophisticated attackers can adapt by maximally sabotaging machine-learning classifiers via polluting training data, rendering most recent machine learning-based malware detection tools (such as DREBIN, DROIDAPIMINER, and MAMADROID) ineffective. In this paper, we explore the feasibility of constructing crafted malware samples; examine how machine-learning classifiers can be misled under three different threat models; then conclude that injecting carefully crafted data into training data can significantly reduce detection accuracy. To tackle the problem, we propose KUAFUDET, a two-phase learning enhancing approach that learns mobile malware by adversarial detection. KUAFUDET includes an offline training phase that selects and extracts features from the training set, and an online detection phase that utilizes the classifier trained by the first phase. To further address the adversarial environment, these two phases are intertwined through a self-adaptive learning scheme, wherein an automated camouflage detector is introduced to filter the suspicious false negatives and feed them back into the training phase. We finally show that KUAFUDET can significantly reduce false negatives and boost the detection accuracy by at least 15%. Experiments on more than 250,000 mobile applications demonstrate that KUAFUDET is scalable and can be highly effective as a standalone system. (C) 2017 Elsevier Ltd. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Hardware & Architecture

Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks

Huaxin Li, Qingrong Chen, Haojin Zhu, Di Ma, Hong Wen, Xuemin (Sherman) Shen

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Information Systems

Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures

Yan Meng, Jinlei Li, Haojin Zhu, Xiaohui Liang, Yao Liu, Na Ruan

IEEE TRANSACTIONS ON MOBILE COMPUTING (2020)

Article Computer Science, Theory & Methods

A novel routing verification approach based on blockchain for inter-domain routing in smart metropolitan area networks

Yaping Liu, Shuo Zhang, Haojin Zhu, Peng-Jun Wan, Lixin Gao, Yaoxue Zhang, Zhihong Tian

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2020)

Article Computer Science, Information Systems

Federated Data Cleaning: Collaborative and Privacy-Preserving Data Cleaning for Edge Intelligence

Lichuan Ma, Qingqi Pei, Lu Zhou, Haojin Zhu, Licheng Wang, Yusheng Ji

Summary: The study proposed a federated data cleaning protocol, FedClean, for edge intelligence scenarios to achieve data cleaning without compromising data privacy. By generating Boolean shares of data and privately computing AVF scores, abnormal data entries are filtered out through a bitonic sorting network.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Automatic Permission Optimization Framework for Privacy Enhancement of Mobile Applications

Yiting Qu, Suguo Du, Shaofeng Li, Yan Meng, Le Zhang, Haojin Zhu

Summary: The study introduces an automatic permission optimization framework called Permizer to recommend different app permission configurations to users with varying privacy preferences. Permizer is the first module to achieve a balance between privacy protection and app functionality under personal privacy preference conditions.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Collective Memory for Detecting Nonconcurrent Clones: A Localized Approach for Global Topology and Identity Tracing in IoT Networks

Jing Xu, Kai Xing, Chi Zhang, Shuo Zhang, Zhonghu Xu, Chunlin Zhong, Haojin Zhu, Zheng Yang, Yunhao Liu

Summary: This article discusses the threat of clone attacks in the Internet of Things and proposes a solution for global topology and identity tracing through a localized computing paradigm, which can reduce communication, storage, and computation overhead while ensuring deterministic detection.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Hardware & Architecture

Wireless Training-Free Keystroke Inference Attack and Defense

Edwin Yang, Song Fang, Ian Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, Haojin Zhu

Summary: This research identifies a new type of keystroke eavesdropping attack that does not require a training phase, and proposes a defense mechanism against it. The attack is based on channel state information extracted from wireless signals, and establishes a mapping between observed environmental changes and dictionary word structures to eavesdrop on keystrokes.

IEEE-ACM TRANSACTIONS ON NETWORKING (2022)

Article Automation & Control Systems

A Federated Learning Based Privacy-Preserving Smart Healthcare System

Jiachun Li, Yan Meng, Lichuan Ma, Suguo Du, Haojin Zhu, Qingqi Pei, Xuemin Shen

Summary: The rapid development of smart healthcare system has made early-stage detection of dementia more user-friendly and affordable, but the concern of potential privacy leakage remains. This article presents ADDetector, a convenient and privacy-preserving system designed with the assistance of IoT devices and security mechanisms, taking Alzheimer's disease as an example. ADDetector utilizes audio collected by widely deployed IoT devices in smart home environment, and employs novel topic-based linguistic features to improve detection accuracy. To address privacy breaches in data, feature, and model levels, ADDetector adopts a unique three-layer architecture and incorporates federated learning, differential privacy, and cryptography-based aggregation mechanisms. Evaluation results demonstrate ADDetector's high accuracy of 81.9% and low time overhead of 0.7s with all privacy-preserving mechanisms implemented.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Review Computer Science, Information Systems

Backdoors Against Natural Language Processing: A Review

Shaofeng Li, Tian Dong, Benjamin Zhao, Jason Xue, Suguo Du, Haojin Zhu

IEEE SECURITY & PRIVACY (2022)

Article Engineering, Electrical & Electronic

Secure and Efficient UAV Tracking in Space-Air-Ground Integrated Network

Jiachun Li, Weijiong Zhang, Yan Meng, Shaofeng Li, Lichuan Ma, Zhen Liu, Haojin Zhu

Summary: With the development of 5G and other communication techniques, the space-air-ground integrated network (SAGIN) is considered a promising solution to provide wide-range, cost-effective, and real-time wireless access. However, unmanned aerial vehicle (UAV) tracking still faces challenges, especially in the presence of malicious attackers. In this study, a secure object tracking system named SecTracker is proposed to enhance the security and efficiency of SAGIN, addressing the issues of message spoofing and routing misbehavior attacks.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Proceedings Paper Computer Science, Information Systems

Secure Hierarchical Deterministic Wallet Supporting Stealth Address

Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu

Summary: Cryptocurrency has experienced rapid development in the past decade, with digital wallets serving as the primary means for public access to cryptocurrency assets. Hierarchical Deterministic Wallet (HDW) and Stealth Address (SA) have gained significant attention and usage in the community due to their convenience and privacy features. However, there is currently no secure wallet algorithm that combines the virtues of both HDW and SA. This study comprehensively investigates HDW and SA, defines the syntax and security models of a Hierarchical Deterministic Wallet supporting Stealth Address (HDWSA), and proposes a specific construction that is proven to be secure in the random oracle model.

COMPUTER SECURITY - ESORICS 2022, PT I (2022)

Proceedings Paper Computer Science, Information Systems

TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing

Aoting Hu, Renjie Xie, Zhigang Lu, Aiqun Hu, Minhui Xue

Summary: This paper introduces a novel Membership Collision Attack against GANs (TableGAN-MCA) that successfully recovers partial GAN training data. Our experimental evaluations reveal five main findings, including the recovery rate on real-world datasets, the size of GAN training data, GAN training epochs, and the number of synthetic samples available to the adversary, all positively correlated to the success of TableGAN-MCA.

CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2021)

Proceedings Paper Computer Science, Information Systems

iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications

Zhushou Tang, Ke Tang, Minhui Xue, Yuan Tian, Sen Chen, Muhammad Ikram, Tielei Wang, Haojin Zhu

PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM (2020)

Proceedings Paper Computer Science, Hardware & Architecture

Voiceprint Mimicry Attack Towards Speaker Verification System in Smart Home

Lei Zhang, Yan Meng, Jiahao Yu, Chong Xiang, Brandon Falk, Haojin Zhu

IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

CyberEntRel: Joint extraction of cyber entities and relations using deep learning

Kashan Ahmed, Syed Khaldoon Khurshid, Sadaf Hina

Summary: This paper mainly introduces the construction of the cyber threat intelligence knowledge graph and the information extraction technique. By using joint extraction technique, it solves the problem of traditional techniques becoming ineffective due to the increasing size of CTI data. Experimental results show that this technique outperforms state-of-the-art models in knowledge triple extraction on CTI data and improves the F1 score.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Enhance membership inference attacks in federated learning

Xinlong He, Yang Xu, Sicong Zhang, Weida Xu, Jiale Yan

Summary: This paper proposes a new membership inference attack method in federated learning, which utilizes data poisoning and sequence prediction confidence. The attack is effective and results in minimal overall model performance degradation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters

Tieming Chen, Huan Zeng, Mingqi Lv, Tiantian Zhu

Summary: In this paper, the authors propose a deep learning based dynamic malware detection method called CTIMD, which integrates threat knowledge from CTIs into the learning process of API call sequences with runtime parameters. Experimental results show that CTIMD outperforms existing methods in terms of performance.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

SuM: Efficient shadow stack protection on ARM Cortex-M

Wonwoo Choi, Minjae Seo, Seongman Lee, Brent Byunghoon Kang

Summary: This paper proposes SUM, a backward-edge control flow protection scheme for ARM Cortex-M processors. It combines MPU and the overlooked hardware feature FaultMask to achieve efficient and robust protection. The empirical evaluation shows minimal runtime overhead for the proposed solution.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Which factors predict susceptibility to phishing? An empirical study

Liliana Ribeiro, Ines Sousa Guedes, Carla Sofia Cardoso

Summary: Phishing susceptibility is influenced by individual and contextual factors. The study found that individuals who perceive themselves as capable of detecting phishing and those who use online services more frequently are more susceptible to phishing. However, technology competencies and other individual variables do not predict phishing susceptibility.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Optimization-based adversarial perturbations against twin support vector machines

Wenjie Wang, Yuanhai Shao, Yiju Wang

Summary: In this paper, we investigate the adversarial perturbations of twin support vector machines (TWSVMs) and propose an optimization framework, which provides explicit solutions to increase the interpretability of the conclusion and convenience for calculation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

AIPA: An Adversarial Imperceptible Patch Attack on Medical Datasets and its Interpretability

Snofy D. Dunston, V. Mary Anita Rajam

Summary: This paper proposes a novel adversarial attack technique that can synthesize adversarial images to mislead deep learning models, and also studies interpretability plots. The research findings show that the proposed attack technique influences the interpretability plots, regardless of the success of the attack.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Protocol clustering of unknown traffic based on embedding of protocol specification

Junchen Li, Guang Cheng, Zongyao Chen, Peng Zhao

Summary: Protocol Reverse Engineering (PRE) is a direct approach for analyzing unknown traffic. This paper proposes a method for clustering unknown traffic based on private protocol labels, and the experimental results demonstrate its advantages on real-world network traffic.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

When explainability turns into a threat- using xAI to fool a fake news detection method

Rafal Kozik, Massimo Ficco, Aleksandra Pawlicka, Marek Pawlicki, Francesco Palmieri, Michal Choras

Summary: The inclusion of Explainability of Artificial Intelligence (xAI) has become a mandatory requirement for designing and implementing reliable, interpretable, and ethical AI solutions. However, it has been shown that xAI can enable successful adversarial attacks in the domain of fake news detection, leading to a decrease in AI security. This paper presents an attack scheme that uses an explainable solution to reshape the structure of the original message, allowing the adversary to manipulate the model's prediction while keeping the message's meaning intact.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Ensuring secure interoperation of access control in a multidomain environment

Benyuan Yang, Lili Luo, Zhimeng Wang

Summary: Interoperation is widely used in practical industrial applications, but merging local access control policies may lead to security violations. Dealing with these issues in a multidomain environment is critical, but finding the maximum secure interoperation among individual systems poses a challenge due to the large number of entities and access involved.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification

Binghui Zou, Chunjie Cao, Longjuan Wang, Sizheng Fu, Tonghua Qiao, Jingzhang Sun

Summary: The ongoing struggle between security researchers and malware has led to the exploration of using convolutional neural networks and capsule networks for classification and identification of malware. However, training these networks requires a significant amount of data and parameters, and the research on capsule networks is still in its early stages, posing challenges.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model

Hongsong Chen, Xingyu Li, Wenmao Liu

Summary: Multivariate time-series anomaly detection is crucial for maintaining normal operation of physical equipment. Recent advances have been made in this field, but two challenges have limited the model's ability to generalize. To address these challenges, a multivariate time-series anomaly detection model consisting of a characterization network and a forecasting network is proposed. Experimental results demonstrate that this method outperforms baseline methods in terms of detection performance and robustness.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FLAD: Adaptive Federated Learning for DDoS attack detection

Roberto Doriguzzi-Corin, Domenico Siracusa

Summary: This paper discusses the application of federated learning in the field of cybersecurity and proposes an adaptive mechanism-based federated learning solution for DDoS attack detection in dynamic cybersecurity scenarios. Through experiments, it is demonstrated that the proposed solution outperforms state-of-the-art federated learning algorithms in terms of convergence time and accuracy.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Municipality2HTTPS: A study on HTTPS protocol's usage in Italian municipalities' websites

Antonio Giovanni Schiavone

Summary: The usage of HTTPS protocol is crucial for secure communication with websites, ensuring the confidentiality, integrity, and authenticity of online data transmissions. The Municipality2HTTPS research project analyzed the implementation of HTTPS in Italian municipalities' websites and identified areas for improvement.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Hello me, meet the real me: Voice synthesis attacks on voice assistants

Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis

Summary: Voice Assistants (VAs) are widely used in smart devices, but are vulnerable to attacks, as shown by experiments with popular VAs revealing successful attack rates exceeding 30% and statistical variations among vendors, calling for additional countermeasures to protect user information.

COMPUTERS & SECURITY (2024)