Nils Loose, Felix Mächtle, Claudius Pott, V. Bezsmertnyĭ, T. Eisenbarth
{"title":"Madvex: Instrumentation-based Adversarial Attacks on Machine Learning Malware Detection","authors":"Nils Loose, Felix Mächtle, Claudius Pott, V. Bezsmertnyĭ, T. Eisenbarth","doi":"10.48550/arXiv.2305.02559","DOIUrl":"https://doi.org/10.48550/arXiv.2305.02559","url":null,"abstract":"WebAssembly (Wasm) is a low-level binary format for web applications, which has found widespread adoption due to its improved performance and compatibility with existing software. However, the popularity of Wasm has also led to its exploitation for malicious purposes, such as cryptojacking, where malicious actors use a victim's computing resources to mine cryptocurrencies without their consent. To counteract this threat, machine learning-based detection methods aiming to identify cryptojacking activities within Wasm code have emerged. It is well-known that neural networks are susceptible to adversarial attacks, where inputs to a classifier are perturbed with minimal changes that result in a crass misclassification. While applying changes in image classification is easy, manipulating binaries in an automated fashion to evade malware classification without changing functionality is non-trivial. In this work, we propose a new approach to include adversarial examples in the code section of binaries via instrumentation. The introduced gadgets allow for the inclusion of arbitrary bytes, enabling efficient adversarial attacks that reliably bypass state-of-the-art machine learning classifiers such as the CNN-based Minos recently proposed at NDSS 2021. We analyze the cost and reliability of instrumentation-based adversarial example generation and show that the approach works reliably at minimal size and performance overheads.","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127569952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Does Malware Use RDTSC? A Study on Operations Executed by Malware with CPU Cycle Measurement","authors":"Y. Oyama","doi":"10.1007/978-3-030-22038-9_10","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_10","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127751457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Practical Password Hardening Based on TLS","authors":"Constantinos Diomedous, E. Athanasopoulos","doi":"10.1007/978-3-030-22038-9_21","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_21","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134236820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wild Extensions: Discovering and Analyzing Unlisted Chrome Extensions","authors":"Aidan Beggs, A. Kapravelos","doi":"10.1007/978-3-030-22038-9_1","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_1","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129440232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alwin Maier, Hugo Gascon, Christian Wressnegger, Konrad Rieck
{"title":"TypeMiner: Recovering Types in Binary Programs Using Machine Learning","authors":"Alwin Maier, Hugo Gascon, Christian Wressnegger, Konrad Rieck","doi":"10.1007/978-3-030-22038-9_14","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_14","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125688460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Perils of Leaking Referrers in Online Collaboration Services","authors":"Beliz Kaleli, Manuel Egele, G. Stringhini","doi":"10.1007/978-3-030-22038-9_4","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_4","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132725499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Large-Scale Analysis of Infrastructure-Leaking DNS Servers","authors":"Dennis Tatang, C. Schneider, Thorsten Holz","doi":"10.1007/978-3-030-22038-9_17","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_17","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123024313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hyunguk Yoo, Sushma Kalle, Jared M. Smith, Irfan Ahmed
{"title":"Overshadow PLC to Detect Remote Control-Logic Injection Attacks","authors":"Hyunguk Yoo, Sushma Kalle, Jared M. Smith, Irfan Ahmed","doi":"10.1007/978-3-030-22038-9_6","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_6","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133752704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pierre Laperdrix, Gildas Avoine, B. Baudry, Nick Nikiforakis
{"title":"Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting","authors":"Pierre Laperdrix, Gildas Avoine, B. Baudry, Nick Nikiforakis","doi":"10.1007/978-3-030-22038-9_3","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_3","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130501577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Olivier Cabana, A. Youssef, M. Debbabi, Bernard Lebel, Marthe Kassouf, B. Agba
{"title":"Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems","authors":"Olivier Cabana, A. Youssef, M. Debbabi, Bernard Lebel, Marthe Kassouf, B. Agba","doi":"10.1007/978-3-030-22038-9_5","DOIUrl":"https://doi.org/10.1007/978-3-030-22038-9_5","url":null,"abstract":"","PeriodicalId":268358,"journal":{"name":"International Conference on Detection of intrusions and malware, and vulnerability assessment","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125788972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}