Over the last decade, several studies have investigated the weaknesses of Android malware detectors against adversarial examples by proposing novel evasion attacks; however, the practicality of most studies in manipulating real-world malware is arguable. The majority of studies have assumed attackers know the details of the target classifiers used for malware detection, while in real life, malicious actors have limited access to the target classifiers. This paper presents a practical evasion attack, EvadeDroid, to circumvent black-box Android malware detectors. In addition to generating real-world adversarial malware, the proposed evasion attack can preserve the functionality of the original malware samples. EvadeDroid applies a set of functionality-preserving transformations to morph malware instances into benign ones using an iterative and incremental manipulation strategy. The proposed manipulation technique is a novel, query-efficient optimization algorithm with the aim of finding and injecting optimal sequences of transformations into malware samples. Our empirical evaluation demonstrates the efficacy of EvadeDroid under hard- and soft-label attacks. Moreover, EvadeDroid is capable to generate practical adversarial examples with only a small number of queries, with evasion rate of 81%, 73%, and 75% for DREBIN, Sec-SVM, and MaMaDroid, respectively. Finally, we show that EvadeDroid is able to preserve its stealthiness against four popular commercial antivirus, thus demonstrating its feasibility in the real world.
翻译:在过去的十年中,一些研究调查了Android恶意软件探测器的弱点,通过提出新颖的规避攻击;然而,大多数关于操纵真实世界恶意软件的研究的实用性是可论证的。大多数研究都假定攻击者知道用于恶意软件检测的目标分类器的细节,而在现实生活中,恶意行为者接触目标分类器的渠道有限。本文介绍了一种实际的规避攻击,EvadeDroid,以绕过黑盒子和机器人恶意软件探测器。除了产生真实世界的对抗恶意软件外,拟议的规避攻击还能维护原始恶意软件样品的功能。EvadeDroid运用一套功能保护转换功能的转换方法,将恶意软件的功能转换成良性软件,使用迭代和渐进的操纵战略。提议的操纵技术是一种创新的、有查询效率的优化算法,目的是寻找和将最佳的序列转换成恶意软件样品。我们的经验评估显示EvadeDroid在硬和软标签攻击下的效率。此外,EvadeDroid机器人能够产生实用的对抗性欺诈例子,只有少量的查询,而真实的规避率分别为81%、73%、75M和75。我们最后展示了它的真实可行性。