Suppr超能文献

GEAAD:针对安卓恶意软件防御生成规避性对抗攻击。

GEAAD: generating evasive adversarial attacks against android malware defense.

作者信息

Ahmad Naveed, Saleem Rana Amjad, Jalil Hadi Hassan, Bashir Hussain Faisal, Chakrabarti Prasun, Alshara Mohammed Ali, Chakrabarti Tulika

机构信息

Prince Sultan University, Riyadh, Saudi Arabia.

Department of Computer Science, Cyber Reconnaissance and Combat Center, Bahria University Islamabad, Islamabad, Pakistan.

出版信息

Sci Rep. 2025 Apr 7;15(1):11867. doi: 10.1038/s41598-025-96392-x.

Abstract

Owing to the proliferation of mobile devices, Google's Android operating system has become a dominant force in global communication. However, its popularity makes it a prime target for cyberattacks. Effective malware detection systems are crucial for combating these escalating threats, particularly amid the evolving use of adversarial examples to evade detection. These systems employ static and dynamic analysis methodologies with machine learning, particularly Generative Adversarial Networks (GANs), which play a key role. The Android Opcode Modification GAN enhances malware detection by intelligently modifying opcode distribution features using the Opcode Frequency Optimal Adjustment algorithm. Despite its effectiveness, the dual-opponent generative adversarial network (DOpGAN) introduces a grey-box attack strategy that misclassifies generated examples as benign, significantly evading detection. DOpGAN operates by altering opcode distribution features during the generation and insertion process, making it particularly challenging for detection systems to classify correctly. The adversarial examples generated by DOpGAN highlight the critical need to integrate defensive measures such as adversarial example detection systems into the Android security framework. Beyond evasion, these adversarial examples provide invaluable opportunities for retraining and improving malware detection systems, thereby ensuring their resilience against emerging threats. The findings underscore the broader need for continuous innovation in Android security mechanisms, fostering collaboration between academia and industry to protect users and systems in an ever-evolving mobile security landscape.

摘要

由于移动设备的激增,谷歌的安卓操作系统已成为全球通信中的主导力量。然而,其受欢迎程度使其成为网络攻击的主要目标。有效的恶意软件检测系统对于应对这些不断升级的威胁至关重要,尤其是在对抗性示例用于逃避检测的使用不断演变的情况下。这些系统采用机器学习的静态和动态分析方法,特别是生成对抗网络(GAN),其发挥着关键作用。安卓操作码修改GAN通过使用操作码频率优化调整算法智能地修改操作码分布特征来增强恶意软件检测。尽管其有效,但双对抗生成对抗网络(DOpGAN)引入了一种灰盒攻击策略,将生成的示例误分类为良性,从而显著逃避检测。DOpGAN通过在生成和插入过程中改变操作码分布特征来运行,这使得检测系统难以正确分类。DOpGAN生成的对抗性示例凸显了将对抗性示例检测系统等防御措施集成到安卓安全框架中的迫切需求。除了逃避检测之外,这些对抗性示例为重新训练和改进恶意软件检测系统提供了宝贵机会,从而确保其对新出现威胁的抵御能力。这些发现强调了在安卓安全机制方面持续创新的更广泛需求,促进学术界和行业之间的合作,以在不断演变的移动安全格局中保护用户和系统。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f7ff/11977250/eb66bf7fb4ee/41598_2025_96392_Fig1_HTML.jpg

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验