The use of Machine Learning has become a significant part of malware detection efforts due to the influx of new malware, an ever changing threat landscape, and the ability of Machine Learning methods to discover meaningful distinctions between malicious and benign software. Antivirus vendors have also begun to widely utilize malware classifiers based on dynamic and static malware analysis features. Therefore, a malware author might make evasive binary modifications against Machine Learning models as part of the malware development life cycle to execute an attack successfully. This makes the studying of possible classifier evasion strategies an essential part of cyber defense against malice. To this extent, we stage a grey box setup to analyze a scenario where the malware author does not know the target classifier algorithm, and does not have access to decisions made by the classifier, but knows the features used in training. In this experiment, a malicious actor trains a surrogate model using the EMBER-2018 dataset to discover binary mutations that cause an instance to be misclassified via a Monte Carlo tree search. Then, mutated malware is sent to the victim model that takes the place of an antivirus API to test whether it can evade detection.
Malware, Anti-virus, Machine Learning, Monte Carlo, MCTS
Boutsikas, J., Eren, M. E., Varga, C., Raff, E., Matuszek, C., and Nicholas, C. (2021). Evading Malware Classifiers via Monte Carlo Mutant Feature Discovery. arXiv preprint arXiv:2106.07860.
@misc{boutsikas2021evading,
title={Evading Malware Classifiers via Monte Carlo Mutant Feature Discovery},
author={John Boutsikas and Maksim E. Eren and Charles Varga and Edward Raff and Cynthia Matuszek and Charles Nicholas},
year={2021},
eprint={2106.07860},
archivePrefix={arXiv},
primaryClass={cs.CR},
note={Presented at the 12th Annual Malware Technical Exchange Meeting, Online, 2021}
}