Heng Li;Bang Wu;Wei Zhou;Wei Yuan;Cuiying Gao;Xinge You;Xiapu Luo
{"title":"An Efficient Adversarial Attack on FCG-Based Android Malware Detection Systems","authors":"Heng Li;Bang Wu;Wei Zhou;Wei Yuan;Cuiying Gao;Xinge You;Xiapu Luo","doi":"10.1109/TIFS.2025.3607270","DOIUrl":null,"url":null,"abstract":"Function Call Graph (FCG) based Android malware detectors can achieve satisfactory detection performance but are vulnerable to adversarial examples (AEs). Existing adversarial attacks generate AEs separately and specifically for different APKs (termed as APK-specific attacks), resulting in significant computational overhead and limited attack efficiency. In this paper, we propose an APK-Agnostic Adversarial Attack Method (termed as A4M) for FCG-based Android malware detection, enabling the deployment of large-scale malware adversarial examples. Meanwhile, this perturbation can also greatly accelerate existing APK-specific attacks. We conduct extensive experiments to evaluate the effectiveness and efficiency of A4M. A4M achieves an average attack success rate (ASR) of 85.17% on 7 target detectors (built with MAMADroid, APIGraph and GNN), significantly surpassing the state-of-the- art attack MalPatch by 28.17%. Experiments also demonstrate A4M can markedly accelerate the APK-specific attacks HIV_CW, HIV_JSMA and DQN, reducing about 88 queries per adversarial example.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"9413-9426"},"PeriodicalIF":8.0000,"publicationDate":"2025-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11153502/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0
Abstract
Function Call Graph (FCG) based Android malware detectors can achieve satisfactory detection performance but are vulnerable to adversarial examples (AEs). Existing adversarial attacks generate AEs separately and specifically for different APKs (termed as APK-specific attacks), resulting in significant computational overhead and limited attack efficiency. In this paper, we propose an APK-Agnostic Adversarial Attack Method (termed as A4M) for FCG-based Android malware detection, enabling the deployment of large-scale malware adversarial examples. Meanwhile, this perturbation can also greatly accelerate existing APK-specific attacks. We conduct extensive experiments to evaluate the effectiveness and efficiency of A4M. A4M achieves an average attack success rate (ASR) of 85.17% on 7 target detectors (built with MAMADroid, APIGraph and GNN), significantly surpassing the state-of-the- art attack MalPatch by 28.17%. Experiments also demonstrate A4M can markedly accelerate the APK-specific attacks HIV_CW, HIV_JSMA and DQN, reducing about 88 queries per adversarial example.
期刊介绍:
The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features