Skip to content

Commit 8ceb75f

Browse files
committed
* update 2024-05-07 06:17:57
1 parent 43c9821 commit 8ceb75f

File tree

2 files changed

+25
-1
lines changed

2 files changed

+25
-1
lines changed

arXiv_db/Malware/2024.md

+24
Original file line numberDiff line numberDiff line change
@@ -1246,3 +1246,27 @@
12461246
12471247
</details>
12481248

1249+
<details>
1250+
1251+
<summary>2024-05-02 19:03:11 - Generative AI in Cybersecurity</summary>
1252+
1253+
- *Shivani Metta, Isaac Chang, Jack Parker, Michael P. Roman, Arturo F. Ehuan*
1254+
1255+
- `2405.01674v1` - [abs](http://arxiv.org/abs/2405.01674v1) - [pdf](http://arxiv.org/pdf/2405.01674v1)
1256+
1257+
> The dawn of Generative Artificial Intelligence (GAI), characterized by advanced models such as Generative Pre-trained Transformers (GPT) and other Large Language Models (LLMs), has been pivotal in reshaping the field of data analysis, pattern recognition, and decision-making processes. This surge in GAI technology has ushered in not only innovative opportunities for data processing and automation but has also introduced significant cybersecurity challenges. As GAI rapidly progresses, it outstrips the current pace of cybersecurity protocols and regulatory frameworks, leading to a paradox wherein the same innovations meant to safeguard digital infrastructures also enhance the arsenal available to cyber criminals. These adversaries, adept at swiftly integrating and exploiting emerging technologies, may utilize GAI to develop malware that is both more covert and adaptable, thus complicating traditional cybersecurity efforts. The acceleration of GAI presents an ambiguous frontier for cybersecurity experts, offering potent tools for threat detection and response, while concurrently providing cyber attackers with the means to engineer more intricate and potent malware. Through the joint efforts of Duke Pratt School of Engineering, Coalfire, and Safebreach, this research undertakes a meticulous analysis of how malicious agents are exploiting GAI to augment their attack strategies, emphasizing a critical issue for the integrity of future cybersecurity initiatives. The study highlights the critical need for organizations to proactively identify and develop more complex defensive strategies to counter the sophisticated employment of GAI in malware creation.
1258+
1259+
</details>
1260+
1261+
<details>
1262+
1263+
<summary>2024-05-02 20:48:42 - Explainability Guided Adversarial Evasion Attacks on Malware Detectors</summary>
1264+
1265+
- *Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Moustafa Saleh*
1266+
1267+
- `2405.01728v1` - [abs](http://arxiv.org/abs/2405.01728v1) - [pdf](http://arxiv.org/pdf/2405.01728v1)
1268+
1269+
> As the focus on security of Artificial Intelligence (AI) is becoming paramount, research on crafting and inserting optimal adversarial perturbations has become increasingly critical. In the malware domain, this adversarial sample generation relies heavily on the accuracy and placement of crafted perturbation with the goal of evading a trained classifier. This work focuses on applying explainability techniques to enhance the adversarial evasion attack on a machine-learning-based Windows PE malware detector. The explainable tool identifies the regions of PE malware files that have the most significant impact on the decision-making process of a given malware detector, and therefore, the same regions can be leveraged to inject the adversarial perturbation for maximum efficiency. Profiling all the PE malware file regions based on their impact on the malware detector's decision enables the derivation of an efficient strategy for identifying the optimal location for perturbation injection. The strategy should incorporate the region's significance in influencing the malware detector's decision and the sensitivity of the PE malware file's integrity towards modifying that region. To assess the utility of explainable AI in crafting an adversarial sample of Windows PE malware, we utilize the DeepExplainer module of SHAP for determining the contribution of each region of PE malware to its detection by a CNN-based malware detector, MalConv. Furthermore, we analyzed the significance of SHAP values at a more granular level by subdividing each section of Windows PE into small subsections. We then performed an adversarial evasion attack on the subsections based on the corresponding SHAP values of the byte sequences.
1270+
1271+
</details>
1272+

0 commit comments

Comments
 (0)