Peng Hao, Yu Zehao, Zhao Dandan, Ding Zhiguo, Yang Jieshuai, Zhang Bo, Han Jianming, Zhang Xuhong, Ji Shouling, Zhong Ming
College of Computer Science and Technology, Zhejiang Normal University, Jinhua, Zhejiang, China.
Key Laboratory of Intelligent Educational Technology and Application in Zhejiang Normal University, Jinhua, 321004, China.
Sci Rep. 2025 Mar 17;15(1):9174. doi: 10.1038/s41598-025-92023-7.
With the continuous advancement of machine learning, numerous malware detection methods that leverage this technology have emerged, presenting new challenges to the generation of adversarial malware. Existing function-preserving adversarial attacks fall short of effectively modifying portable executable (PE) malware control flow graphs (CFGs), thereby failing to bypass the graph neural network (GNN) models that utilize CFGs for detection. To solve this issue, we introduce a novel base modification method called active opcode insertion, which modifies PE CFGs while preserving functionality by inserting a processed sequence of benign and jump opcodes to connect with the original base block. Using reinforcement learning, MalAOI identifies optimal insertion points and benign opcode sequences to autonomously generate adversarial malware that evades GNN model detection. We tested our approach on the BODMAS and SOREL-20M datasets, and the results demonstrate that MalAOI-generated adversarial malware achieves an average evasion rate of 93.73% against the GNN detection model, with only 12.87% increase in byte size.
随着机器学习的不断进步,众多利用该技术的恶意软件检测方法应运而生,这给对抗性恶意软件的生成带来了新的挑战。现有的功能保留对抗性攻击无法有效修改便携式可执行文件(PE)恶意软件控制流图(CFG),从而无法绕过利用CFG进行检测的图神经网络(GNN)模型。为了解决这个问题,我们引入了一种名为主动操作码插入的新型基块修改方法,该方法通过插入经过处理的良性和跳转操作码序列来连接原始基本块,从而在保留功能的同时修改PE CFG。通过强化学习,MalAOI识别出最佳插入点和良性操作码序列,以自主生成能够逃避GNN模型检测的对抗性恶意软件。我们在BODMAS和SOREL - 20M数据集上测试了我们的方法,结果表明,由MalAOI生成的对抗性恶意软件对GNN检测模型的平均逃避率达到93.73%,字节大小仅增加12.87%。