Malware has been one of the most damaging threats to computers that span across multiple operating systems and various file formats. To defend against ever-increasing and ever-evolving malware, tremendous efforts have been made to propose a variety of malware detection that attempt to effectively and efficiently detect malware so as to mitigate possible damages as early as possible. Recent studies have shown that, on the one hand, existing ML and DL techniques enable superior solutions in detecting newly emerging and previously unseen malware. However, on the other hand, ML and DL models are inherently vulnerable to adversarial attacks in the form of adversarial examples. In this paper, we focus on malware with the file format of portable executable (PE) in the family of Windows operating systems, namely Windows PE malware, as a representative case to study the adversarial attack methods in such adversarial settings. To be specific, we start by first outlining the general learning framework of Windows PE malware detection based on ML/DL and subsequently highlighting three unique challenges of performing adversarial attacks in the context of Windows PE malware. Then, we conduct a comprehensive and systematic review to categorize the state-of-the-art adversarial attacks against PE malware detection, as well as corresponding defenses to increase the robustness of Windows PE malware detection. Finally, we conclude the paper by first presenting other related attacks against Windows PE malware detection beyond the adversarial attacks and then shedding light on future research directions and opportunities. In addition, a curated resource list of adversarial attacks and defenses for Windows PE malware detection is also available at https://github.com/ryderling/adversarial-attacks-and-defenses-for-windows-pe-malware-detection.
翻译:Malware是贯穿多种操作系统和各种文件格式的计算机面临的最具破坏性的威胁之一。为了防范不断增长和不断演变的恶意软件,我们已作出巨大努力,提出各种恶意软件检测,试图有效和高效地检测恶意软件,以便尽早减轻可能的损害。最近的研究显示,一方面,现有的ML和DL技术在发现新出现和以前不为人知的恶意软件方面能够提供优异的解决方案。另一方面,ML和DL模型在本质上很容易受到对抗性攻击,其形式为对抗性攻击。在本文中,我们侧重于恶意软件,在视窗操作系统组中,即Windows PE 恶意软件的移动性可操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性软件(PE)的文件格式,即Windows PE 恶意软件,作为研究性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作系统,从而研究在这种对抗性对抗性对抗性对抗性操作性操作性操作性操作性操作性操作性操作性攻击中,从而最终测试性操作性操作性攻击性攻击性操作性操作性操作性操作性操作性操作性操作性操作性操作性操作性攻击性攻击性操作性操作性操作性攻击性攻击性操作性操作性操作性操作性操作性操作性操作性操作性攻击性攻击性攻击性攻击中,从而增加。我们性攻击性攻击性攻击性攻击性攻击性PMAE。我们首先,我们通过对磁性攻击性操作性操作性攻击性攻击性测试性攻击性攻击性操作性攻击性操作性操作性操作性操作性操作性操作性操作性攻击性攻击性攻击性攻击性攻击性攻击性攻击性攻击性攻击性攻击性攻击性攻击性P和制来进行性PL/DL/DLE 。我们,以进行全面和的常规性操作性操作性操作性操作性操作性操作性PL/DVDAR