Adversarial-Example Attacks Toward Android Malware Detection System

Recently, it was shown that the generative adversarial network (GAN) based adversarial-example attacks could thoroughly defeat the existing Android malware detection systems. However, they can be easily defended through deploying a firewall (i.e., adversarial example detector) to filter adversarial examples. To evade both malware detection and adversarial example detection, we develop a new adversarial-example attack method based on our proposed bi-objective GAN. Experiments show that over <inline-formula><tex-math notation="LaTeX">$\text{95}\%$</tex-math></inline-formula> of adversarial examples generated by our method break through the firewall-equipped Android malware detection system, outperforming the state-of-the-art method by <inline-formula><tex-math notation="LaTeX">$\text{247.68}\%$</tex-math></inline-formula>.

[1]  Logan Engstrom,et al.  Black-box Adversarial Attacks with Limited Queries and Information , 2018, ICML.

[2]  Konrad Rieck,et al.  DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.

[3]  Ying Tan,et al.  Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN , 2017, DMBD.

[4]  Neeraj Kumar,et al.  MEnSuS: An efficient scheme for energy management with sustainability of cloud data centers in edge-cloud environment , 2017, Future Gener. Comput. Syst..

[5]  W. Marsden I and J , 2012 .

[6]  Mohammad S. Obaidat,et al.  Deep Learning-Based Content Centric Data Dissemination Scheme for Internet of Vehicles , 2018, 2018 IEEE International Conference on Communications (ICC).

[7]  Jacques Klein,et al.  AndroZoo++: Collecting Millions of Android Apps and Their Metadata for the Research Community , 2017, ArXiv.

[8]  Jacques Klein,et al.  AndroZoo: Collecting Millions of Android Apps for the Research Community , 2016, 2016 IEEE/ACM 13th Working Conference on Mining Software Repositories (MSR).

[9]  Joel J. P. C. Rodrigues,et al.  SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment , 2018, IEEE Communications Magazine.

[10]  Jonathon Shlens,et al.  Explaining and Harnessing Adversarial Examples , 2014, ICLR.

[11]  Ajmal Mian,et al.  Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.

[12]  Witawas Srisa-an,et al.  Significant Permission Identification for Machine-Learning-Based Android Malware Detection , 2018, IEEE Transactions on Industrial Informatics.