z-logo
open-access-imgOpen Access
Automatically Evading Classifiers: A Case Study on PDF Malware Classifiers
Author(s) -
Weilin Xu,
Yanjun Qi,
David Evans
Publication year - 2016
Language(s) - English
Resource type - Conference proceedings
DOI - 10.14722/ndss.2016.23115
Subject(s) - malware , computer science , robustness (evolution) , machine learning , classifier (uml) , artificial intelligence , data mining , computer security , biochemistry , chemistry , gene
Machine learning is widely used to develop classifiers for security tasks. However, the robustness of these methods against motivated adversaries is uncertain. In this work, we propose a generic method to evaluate the robustness of classifiers under attack. The key idea is to stochastically manipulate a malicious sample to find a variant that preserves the malicious behavior but is classified as benign by the classifier. We present a general approach to search for evasive variants and report on results from experiments using our techniques against two PDF malware classifiers, PDFrate and Hidost. Our method is able to automatically find evasive variants for both classifiers for all of the 500 malicious seeds in our study. Our results suggest a general method for evaluating classifiers used in security applications, and raise serious doubts about the effectiveness of classifiers based on superficial features in the presence of adversaries.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom