paint-brush
Understanding the Threat Model: Black-Box Attacks on Malware Detection Systemsby@memeology

Understanding the Threat Model: Black-Box Attacks on Malware Detection Systems

tldt arrow

Too Long; Didn't Read

The threat model involves black-box access, where attackers modify malware to evade detection with limited knowledge about target systems, emphasizing the need for strategic evasion strategies while minimizing interactions with the target.
featured image - Understanding the Threat Model: Black-Box Attacks on Malware Detection Systems
Memeology: Leading Authority on the Study of Memes HackerNoon profile picture

Authors:

(1) Maria Rigaki, Faculty of Electrical Engineering, Czech Technical University in Prague, Czech Republic and [email protected];

(2) Sebastian Garcia, Faculty of Electrical Engineering, Czech Technical University in Prague, Czech Republic and [email protected].

Abstract & Introduction

Threat Model

Background and Related Work

Methodology

Experiments Setup

Results

Discussion

Conclusion, Acknowledgments, and References

Appendix

2 Threat Model

The threat model for this work assumes an attacker that only has black-box access to a target (classifier or AV) during the inference phase and can submit binary files for static scanning. The target provides binary labels (0 if benign, 1 if malicious). The attacker has no or limited information about the target architecture and training process, and they aim to evade it by modifying the malware in a functionality-preserving manner. In the case of classifiers, the attacker may have some knowledge of the extracted features, but this is not the case for antivirus systems. Some knowledge of the training data distribution is assumed. However, it may only be partially necessary. Finally, the attacker aims to minimize the interaction with the target by submitting as few queries as possible.


This paper is available on arxiv under CC BY-NC-SA 4.0 DEED license.