Android is the most popular OS worldwide. Therefore, it is a target for various kinds of malware. As a countermeasure, the security community works day and night to develop appropriate Android malware detection systems, with ML-based or DL-based systems considered as some of the most common types. Against these detection systems, intelligent adversaries develop a wide set of evasion attacks, in which an attacker slightly modifies a malware sample to evade its target detection system. In this survey, we address problem-space evasion attacks in the Android OS, where attackers manipulate actual APKs, rather than their extracted feature vector. We aim to explore this kind of attacks, frequently overlooked by the research community due to a lack of knowledge of the Android domain, or due to focusing on general mathematical evasion attacks - i.e., feature-space evasion attacks. We discuss the different aspects of problem-space evasion attacks, using a new taxonomy, which focuses on key ingredients of each problem-space attack, such as the attacker model, the attacker's mode of operation, and the functional assessment of post-attack applications.
翻译:Android是全世界最受欢迎的OS。 因此, 它是一个针对各种恶意软件的目标。 作为一种反措施, 安全社区日夜工作开发适当的Android 恶意软件检测系统, 使用基于 ML 或 DL 的系统被认为是最常见的类型。 针对这些检测系统, 智能对手开发了一系列广泛的规避攻击, 攻击者略微修改恶意软件样本以规避其目标检测系统。 在这次调查中, 我们处理在Android OS 中的问题- 空间规避攻击, 攻击者在那里操纵实际的APK, 而不是其提取的特性矢量。 我们的目标是探索这种攻击, 研究界由于对机器人域缺乏了解而经常忽视的, 或者由于专注于一般的数学规避攻击, 即地空规避攻击。 我们讨论问题- 空间规避攻击的不同方面, 使用新的分类方法, 侧重于每个问题- 空间攻击的关键成分, 比如攻击者模型、 攻击者的行动模式, 以及攻击后应用的功能评估。