首页 > 最新文献

Journal of Computer Virology and Hacking Techniques最新文献

英文 中文
Faulty use of the CIC-IDS 2017 dataset in information security research 在信息安全研究中错误使用 CIC-IDS 2017 数据集
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-28 DOI: 10.1007/s11416-023-00509-7
Rohit Dube
{"title":"Faulty use of the CIC-IDS 2017 dataset in information security research","authors":"Rohit Dube","doi":"10.1007/s11416-023-00509-7","DOIUrl":"https://doi.org/10.1007/s11416-023-00509-7","url":null,"abstract":"","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":"31 8","pages":"1-9"},"PeriodicalIF":1.5,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139149986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Partial key exposure attack on RSA using some private key blocks 利用私钥块对RSA进行部分密钥暴露攻击
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-08 DOI: 10.1007/s11416-023-00507-9
Santosh Kumar Ravva, K. L. N. C. Prakash, S. R. M. Krishna
RSA is a well-known cryptosystem in public-key cryptography and the strength of the cryptosystem depends on the hardness of factoring large integers. Several attacks have been proposed by using the partial information of the secret parameters, which can be obtained by side-channel attacks. Partial key exposure attacks exploit the information gained by a side-channel attack(s) and identify the potential of the RSA cryptosystem if an attacker knows that partial information. In this paper, we investigate the strength of RSA, if an attacker obtains some blocks of the secret exponent, and by guessing successfully a few most significant bits (MSBs) of any of the primes in RSA. Some blocks of the secret exponent can be extracted by cold boot attack and some MSBs of any of the primes can be guessed correctly. We apply LLL algorithm to attack the RSA and follow the Jochemsz and May approach to construct the lattice.
RSA是公钥密码学中著名的密码系统,该密码系统的强度取决于分解大整数的难度。已经提出了几种利用秘密参数的部分信息进行攻击的方法,这些信息可以通过侧信道攻击获得。部分密钥暴露攻击利用由侧信道攻击获得的信息,并在攻击者知道部分信息的情况下识别RSA密码系统的潜力。在本文中,我们研究了RSA的强度,如果攻击者获得了秘密指数的一些块,并通过成功猜测RSA中任何素数的几个最高有效位(msb)。通过冷启动攻击可以提取秘密指数的一些块,并且可以正确猜出任意素数的一些msb。我们使用LLL算法来攻击RSA,并遵循Jochemsz和May方法来构造格。
{"title":"Partial key exposure attack on RSA using some private key blocks","authors":"Santosh Kumar Ravva, K. L. N. C. Prakash, S. R. M. Krishna","doi":"10.1007/s11416-023-00507-9","DOIUrl":"https://doi.org/10.1007/s11416-023-00507-9","url":null,"abstract":"RSA is a well-known cryptosystem in public-key cryptography and the strength of the cryptosystem depends on the hardness of factoring large integers. Several attacks have been proposed by using the partial information of the secret parameters, which can be obtained by side-channel attacks. Partial key exposure attacks exploit the information gained by a side-channel attack(s) and identify the potential of the RSA cryptosystem if an attacker knows that partial information. In this paper, we investigate the strength of RSA, if an attacker obtains some blocks of the secret exponent, and by guessing successfully a few most significant bits (MSBs) of any of the primes in RSA. Some blocks of the secret exponent can be extracted by cold boot attack and some MSBs of any of the primes can be guessed correctly. We apply LLL algorithm to attack the RSA and follow the Jochemsz and May approach to construct the lattice.","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":"84 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135341674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A natural language processing approach to Malware classification 恶意软件分类的自然语言处理方法
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-20 DOI: 10.1007/s11416-023-00506-w
Ritik Mehta, Olha Jurečková, Mark Stamp
Many different machine learning and deep learning techniques have been successfully employed for malware detection and classification. Examples of popular learning techniques in the malware domain include Hidden Markov Models (HMM), Random Forests (RF), Convolutional Neural Networks (CNN), Support Vector Machines (SVM), and Recurrent Neural Networks (RNN) such as Long Short-Term Memory (LSTM) networks. In this research, we consider a hybrid architecture, where HMMs are trained on opcode sequences, and the resulting hidden states of these trained HMMs are used as feature vectors in various classifiers. In this context, extracting the HMM hidden state sequences can be viewed as a form of feature engineering that is somewhat analogous to techniques that are commonly employed in Natural Language Processing (NLP). We find that this NLP-based approach outperforms other popular techniques on a challenging malware dataset, with an HMM-Random Forest model yielding the best results.
许多不同的机器学习和深度学习技术已经成功地用于恶意软件检测和分类。恶意软件领域流行的学习技术的例子包括隐马尔可夫模型(HMM)、随机森林(RF)、卷积神经网络(CNN)、支持向量机(SVM)和循环神经网络(RNN),如长短期记忆(LSTM)网络。在这项研究中,我们考虑了一种混合架构,其中hmm在操作码序列上进行训练,并将这些训练好的hmm的隐藏状态用作各种分类器的特征向量。在这种情况下,可以将HMM隐藏状态序列的提取视为特征工程的一种形式,这在某种程度上类似于自然语言处理(NLP)中常用的技术。我们发现这种基于nlp的方法在具有挑战性的恶意软件数据集上优于其他流行的技术,其中HMM-Random Forest模型产生了最好的结果。
{"title":"A natural language processing approach to Malware classification","authors":"Ritik Mehta, Olha Jurečková, Mark Stamp","doi":"10.1007/s11416-023-00506-w","DOIUrl":"https://doi.org/10.1007/s11416-023-00506-w","url":null,"abstract":"Many different machine learning and deep learning techniques have been successfully employed for malware detection and classification. Examples of popular learning techniques in the malware domain include Hidden Markov Models (HMM), Random Forests (RF), Convolutional Neural Networks (CNN), Support Vector Machines (SVM), and Recurrent Neural Networks (RNN) such as Long Short-Term Memory (LSTM) networks. In this research, we consider a hybrid architecture, where HMMs are trained on opcode sequences, and the resulting hidden states of these trained HMMs are used as feature vectors in various classifiers. In this context, extracting the HMM hidden state sequences can be viewed as a form of feature engineering that is somewhat analogous to techniques that are commonly employed in Natural Language Processing (NLP). We find that this NLP-based approach outperforms other popular techniques on a challenging malware dataset, with an HMM-Random Forest model yielding the best results.","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135567640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using deep graph learning to improve dynamic analysis-based malware detection in PE files 利用深度图学习改进PE文件中基于动态分析的恶意软件检测
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-20 DOI: 10.1007/s11416-023-00505-x
Minh Tu Nguyen, Viet Hung Nguyen, Nathan Shone
Detecting zero-day malware in Windows PE files using dynamic analysis techniques has proven to be far more effective than traditional signature-based methods. One specific approach that has emerged in recent years is the use of graphs to represent executable behavior, which can be subsequently used to learn patterns. However, many current graph representations omit key parameter information, meaning that the behavioral impact of variable changes cannot be reliably understood. To combat these shortcomings, we present a new method for malware detection by applying a graph attention network on multi-edge directional heterogeneous graphs constructed from API calls. The experiments show the TPR and FPR scores demonstrated by our model, achieve better performance than those from other related works.
使用动态分析技术检测Windows PE文件中的零日恶意软件已被证明比传统的基于签名的方法有效得多。近年来出现的一种特定方法是使用图来表示可执行的行为,随后可以使用图来学习模式。然而,许多当前的图形表示忽略了关键参数信息,这意味着变量变化的行为影响不能可靠地理解。为了克服这些缺点,我们提出了一种新的恶意软件检测方法,即在由API调用构建的多边缘定向异构图上应用图关注网络。实验表明,我们的模型得到的TPR和FPR分数比其他相关研究的结果更好。
{"title":"Using deep graph learning to improve dynamic analysis-based malware detection in PE files","authors":"Minh Tu Nguyen, Viet Hung Nguyen, Nathan Shone","doi":"10.1007/s11416-023-00505-x","DOIUrl":"https://doi.org/10.1007/s11416-023-00505-x","url":null,"abstract":"Detecting zero-day malware in Windows PE files using dynamic analysis techniques has proven to be far more effective than traditional signature-based methods. One specific approach that has emerged in recent years is the use of graphs to represent executable behavior, which can be subsequently used to learn patterns. However, many current graph representations omit key parameter information, meaning that the behavioral impact of variable changes cannot be reliably understood. To combat these shortcomings, we present a new method for malware detection by applying a graph attention network on multi-edge directional heterogeneous graphs constructed from API calls. The experiments show the TPR and FPR scores demonstrated by our model, achieve better performance than those from other related works.","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":"22 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135617035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis of RSA with composed decryption exponent with few most significant bits of one of the primes 具有组合解密指数的RSA密码分析,其中一个素数的最高有效位很少
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-20 DOI: 10.1007/s11416-023-00508-8
R. Santosh Kumar, K. L. N. C. Prakash, S. R. M. Krishna
RSA is well known public-key cryptosystem in modern-day cryptography. Since the inception of the RSA, several attacks have been proposed on RSA. The Boneh–Durfee attack is the most prominent and they showed that if the secrete exponent is less than 0.292, RSA is completely vulnerable. In this paper, we further investigate the vulnerability of RSA whenever a secret exponent is large and the composite form with a few most significant bits of one of the primes exposed. Having a large secret exponent can avoid the Boneh–Durfee attack, but in this attack, we show that even though the secret exponent is large and has some specialized structure then RSA is still vulnerable. We follow the Jochemsz and May strategy for constructing the lattice, and the LLL algorithm is used for lattice reduction. Our attack outperforms most of the previous attacks.
RSA是现代密码学中著名的公钥密码系统。自RSA诞生以来,已经提出了几种针对RSA的攻击。Boneh-Durfee攻击是最突出的,他们表明,如果秘密指数小于0.292,RSA是完全脆弱的。在本文中,我们进一步研究了当一个秘密指数很大时RSA的脆弱性,以及暴露其中一个素数的几个最高有效位的复合形式。大的秘密指数可以避免Boneh-Durfee攻击,但在这次攻击中,我们证明了即使秘密指数很大,并且有一些特殊的结构,RSA仍然是脆弱的。我们遵循Jochemsz和May策略来构造晶格,并使用LLL算法进行晶格约简。我们的攻击比以前的大多数攻击都有效。
{"title":"Cryptanalysis of RSA with composed decryption exponent with few most significant bits of one of the primes","authors":"R. Santosh Kumar, K. L. N. C. Prakash, S. R. M. Krishna","doi":"10.1007/s11416-023-00508-8","DOIUrl":"https://doi.org/10.1007/s11416-023-00508-8","url":null,"abstract":"RSA is well known public-key cryptosystem in modern-day cryptography. Since the inception of the RSA, several attacks have been proposed on RSA. The Boneh–Durfee attack is the most prominent and they showed that if the secrete exponent is less than 0.292, RSA is completely vulnerable. In this paper, we further investigate the vulnerability of RSA whenever a secret exponent is large and the composite form with a few most significant bits of one of the primes exposed. Having a large secret exponent can avoid the Boneh–Durfee attack, but in this attack, we show that even though the secret exponent is large and has some specialized structure then RSA is still vulnerable. We follow the Jochemsz and May strategy for constructing the lattice, and the LLL algorithm is used for lattice reduction. Our attack outperforms most of the previous attacks.","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135569645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protection against adversarial attacks with randomization of recognition algorithm 基于随机识别算法的对抗性攻击防护
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-05 DOI: 10.1007/s11416-023-00503-z
Grigory Marshalko, Svetlana Koreshkova
We study a randomized variant of one type of biometric recognition algorithms, which is intended to mitigate adversarial attacks. We show that the problem of an estimation of the security of the proposed algorithm can be formulated in the form of an estimation of statistical distance between the probability distributions, induced by the initial and the randomized algorithm. A variant of practical password-based implementation is discussed. The results of experimental evaluation are given. The preliminary verison of this research was presented at CTCrypt 2020 workshop.
我们研究了一种生物识别算法的随机变体,旨在减轻对抗性攻击。我们证明了该算法的安全性估计问题可以用初始算法和随机算法引起的概率分布之间的统计距离估计的形式来表示。讨论了一种实用的基于密码的实现方法。给出了实验评价结果。这项研究的初步版本在CTCrypt 2020研讨会上发表。
{"title":"Protection against adversarial attacks with randomization of recognition algorithm","authors":"Grigory Marshalko, Svetlana Koreshkova","doi":"10.1007/s11416-023-00503-z","DOIUrl":"https://doi.org/10.1007/s11416-023-00503-z","url":null,"abstract":"We study a randomized variant of one type of biometric recognition algorithms, which is intended to mitigate adversarial attacks. We show that the problem of an estimation of the security of the proposed algorithm can be formulated in the form of an estimation of statistical distance between the probability distributions, induced by the initial and the randomized algorithm. A variant of practical password-based implementation is discussed. The results of experimental evaluation are given. The preliminary verison of this research was presented at CTCrypt 2020 workshop.","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134977187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Provably minimum data complexity integral distinguisher based on conventional division property 证明了基于常规除法性质的最小数据复杂度积分区分符
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-28 DOI: 10.1007/s11416-023-00502-0
Akram Khalesi, Zahra Ahmadian
Division property is an effective method for finding integral distinguishers for block ciphers, performing cube attacks on stream ciphers, and studying the algebraic degree of boolean functions. One of the main problems in this field is how to provably find the smallest input multiset leading to a balanced output. In this paper, we propose a new method, using the division property, to find integral distinguishers for permutation functions and block ciphers, with provably-minimum data complexity, in the conventional division property model. The new method is based on a precise and efficient analysis of the target output bit’s algebraic normal form. We examine the proposed method on LBlock, TWINE, SIMON, Present, Gift, and Clyde-128 block ciphers. Although in most cases, the results are consistent with the distinguishers reported in previous work, their optimality is proved, in the conventional division property model. Moreover, the proposed method can find distinguishers for 8-round Clyde-128 with less data complexity than previously reported. Based on the proposed method, we also develop an algorithm capable of determining the maximum number of balanced output bits for integral distinguishers with a certain number of active bits. Accordingly, for the ciphers under study, we determine the maximum number of balanced bits for integral distinguishers with data complexities set to minimum and slightly higher, resulting in improved distinguishers for Gift-64, Present, and SIMON64, in the conventional model.
除法性质是寻找分组密码的整数区分符、对流密码进行立方体攻击以及研究布尔函数的代数度的有效方法。该领域的主要问题之一是如何找到可证明的最小输入多集,从而达到平衡输出。本文提出了一种新的方法,利用除法的性质,在传统的除法性质模型中寻找数据复杂度可证明最小的置换函数和分组密码的积分区分符。该方法基于对目标输出钻头的代数范式进行精确、高效的分析。我们在LBlock、TWINE、SIMON、Present、Gift和Clyde-128分组密码上检验了所提出的方法。虽然在大多数情况下,结果与先前工作中报道的区分者一致,但在传统的划分属性模型中,它们的最优性得到了证明。此外,该方法能够以较低的数据复杂度找到8轮Clyde-128的区分符。基于所提出的方法,我们还开发了一种能够确定具有一定数量有效位的积分区分符的最大平衡输出位数的算法。因此,对于所研究的密码,我们确定了将数据复杂性设置为最小且略高的整数区分符的最大平衡位数,从而在传统模型中改进了Gift-64、Present和SIMON64的区分符。
{"title":"Provably minimum data complexity integral distinguisher based on conventional division property","authors":"Akram Khalesi, Zahra Ahmadian","doi":"10.1007/s11416-023-00502-0","DOIUrl":"https://doi.org/10.1007/s11416-023-00502-0","url":null,"abstract":"Division property is an effective method for finding integral distinguishers for block ciphers, performing cube attacks on stream ciphers, and studying the algebraic degree of boolean functions. One of the main problems in this field is how to provably find the smallest input multiset leading to a balanced output. In this paper, we propose a new method, using the division property, to find integral distinguishers for permutation functions and block ciphers, with provably-minimum data complexity, in the conventional division property model. The new method is based on a precise and efficient analysis of the target output bit’s algebraic normal form. We examine the proposed method on LBlock, TWINE, SIMON, Present, Gift, and Clyde-128 block ciphers. Although in most cases, the results are consistent with the distinguishers reported in previous work, their optimality is proved, in the conventional division property model. Moreover, the proposed method can find distinguishers for 8-round Clyde-128 with less data complexity than previously reported. Based on the proposed method, we also develop an algorithm capable of determining the maximum number of balanced output bits for integral distinguishers with a certain number of active bits. Accordingly, for the ciphers under study, we determine the maximum number of balanced bits for integral distinguishers with data complexities set to minimum and slightly higher, resulting in improved distinguishers for Gift-64, Present, and SIMON64, in the conventional model.","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135385328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Explainable Ransomware Detection with Deep Learning Techniques 基于深度学习技术的可解释勒索软件检测
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-27 DOI: 10.1007/s11416-023-00501-1
Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
Globally, the number of internet users increases every year. As a matter of fact, we use technological devices to surf the internet, for online shopping, or just to relax and keep our relationships by spending time on social networks. By doing any of those actions, we release information that can be used in many ways, such as targeted advertising via cookies but also abused by malicious users for scams or theft. On the other hand, many detection systems have been developed with the aim to counteract malicious actions. In particular, special attention has been paid to the malware, designed to perpetrate malicious actions inside software systems and widespread through internet networks or e-mail messages. In this paper, we propose a deep learning model aimed to detect ransomware. We propose a set of experiments aimed to demonstrate that the proposed method obtains good accuracy during the training and test phases across a dataset of over 15,000 elements. Moreover, to improve our results and interpret the output obtained from the models, we have also exploited the Gradient-weighted Class Activation Mapping.
从全球来看,互联网用户的数量每年都在增加。事实上,我们使用科技设备上网,网上购物,或者只是为了放松和保持我们的关系,花时间在社交网络上。通过执行这些操作,我们发布的信息可以以多种方式使用,例如通过cookie进行定向广告,但也会被恶意用户滥用,用于诈骗或盗窃。另一方面,许多检测系统都是为了对抗恶意行为而开发的。特别值得注意的是,恶意软件被设计成在软件系统内实施恶意行为,并通过互联网网络或电子邮件传播。在本文中,我们提出了一种旨在检测勒索软件的深度学习模型。我们提出了一组实验,旨在证明所提出的方法在超过15,000个元素的数据集的训练和测试阶段获得了良好的准确性。此外,为了改进我们的结果并解释从模型中获得的输出,我们还利用了梯度加权类激活映射。
{"title":"Explainable Ransomware Detection with Deep Learning Techniques","authors":"Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone","doi":"10.1007/s11416-023-00501-1","DOIUrl":"https://doi.org/10.1007/s11416-023-00501-1","url":null,"abstract":"Globally, the number of internet users increases every year. As a matter of fact, we use technological devices to surf the internet, for online shopping, or just to relax and keep our relationships by spending time on social networks. By doing any of those actions, we release information that can be used in many ways, such as targeted advertising via cookies but also abused by malicious users for scams or theft. On the other hand, many detection systems have been developed with the aim to counteract malicious actions. In particular, special attention has been paid to the malware, designed to perpetrate malicious actions inside software systems and widespread through internet networks or e-mail messages. In this paper, we propose a deep learning model aimed to detect ransomware. We propose a set of experiments aimed to demonstrate that the proposed method obtains good accuracy during the training and test phases across a dataset of over 15,000 elements. Moreover, to improve our results and interpret the output obtained from the models, we have also exploited the Gradient-weighted Class Activation Mapping.","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135536257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mal2GCN: a robust malware detection approach using deep graph convolutional networks with non-negative weights Mal2GCN:一种鲁棒的恶意软件检测方法,使用非负权重的深度图卷积网络
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-27 DOI: 10.1007/s11416-023-00498-7
Omid Kargarnovin, Amir Mahdi Sadeghzadeh, Rasool Jalili
With the growing use of Deep Learning (DL) to tackle various problems, securing these models against adversaries has become a primary concern for researchers. Recent studies have shown that DL-based malware detectors are vulnerable to adversarial examples. An adversary can create carefully crafted adversarial examples to evade DL-based malware detectors. In this paper, we propose Mal2GCN, a robust malware detection model that uses Function Call Graph (FCG) representation of executable files combined with Graph Convolution Network (GCN) to detect Windows malware. Since the FCG representation of executable files is more robust than the raw byte sequence representation, numerous proposed adversarial example generating methods are ineffective in evading Mal2GCN. Moreover, we use the non-negative training method to transform Mal2GCN into a monotonically non-decreasing function; thereby, making it theoretically robust against appending attacks. Besides, experimental results on a collected dataset of PE executables demonstrate that Mal2GCN can detect malware with 98.15% accuracy, outperforming its counterparts. We then present a black-box source code-based adversarial malware generation approach that can be used to evaluate the robustness of malware detection models against real-world adversaries. This approach injects adversarial code into various locations of malware source code, aiming to evade malware detection models. The experiments indicate that Mal2GCN with non-negative weights achieves high accuracy in detecting Windows malware while also exhibiting robustness against adversarial attacks that add benign features to the malware source code.
随着深度学习(DL)越来越多地用于解决各种问题,保护这些模型免受攻击已成为研究人员的主要关注点。最近的研究表明,基于dl的恶意软件检测器容易受到对抗性示例的攻击。攻击者可以创建精心设计的对抗性示例来逃避基于dl的恶意软件检测器。在本文中,我们提出了Mal2GCN,这是一个鲁棒的恶意软件检测模型,它使用可执行文件的函数调用图(FCG)表示结合图卷积网络(GCN)来检测Windows恶意软件。由于可执行文件的FCG表示比原始字节序列表示更健壮,因此许多提出的对抗性示例生成方法在逃避Mal2GCN方面是无效的。此外,我们使用非负训练方法将Mal2GCN转化为单调非递减函数;因此,使其在理论上对附加攻击具有鲁棒性。此外,在收集的PE可执行文件数据集上的实验结果表明,Mal2GCN检测恶意软件的准确率为98.15%,优于同类软件。然后,我们提出了一种基于黑盒源代码的对抗性恶意软件生成方法,可用于评估恶意软件检测模型对现实世界对手的鲁棒性。该方法将对抗性代码注入恶意软件源代码的各个位置,旨在逃避恶意软件检测模型。实验表明,非负权重的Mal2GCN在检测Windows恶意软件时达到了很高的准确性,同时也表现出对恶意软件源代码添加良性特征的对抗性攻击的鲁棒性。
{"title":"Mal2GCN: a robust malware detection approach using deep graph convolutional networks with non-negative weights","authors":"Omid Kargarnovin, Amir Mahdi Sadeghzadeh, Rasool Jalili","doi":"10.1007/s11416-023-00498-7","DOIUrl":"https://doi.org/10.1007/s11416-023-00498-7","url":null,"abstract":"With the growing use of Deep Learning (DL) to tackle various problems, securing these models against adversaries has become a primary concern for researchers. Recent studies have shown that DL-based malware detectors are vulnerable to adversarial examples. An adversary can create carefully crafted adversarial examples to evade DL-based malware detectors. In this paper, we propose Mal2GCN, a robust malware detection model that uses Function Call Graph (FCG) representation of executable files combined with Graph Convolution Network (GCN) to detect Windows malware. Since the FCG representation of executable files is more robust than the raw byte sequence representation, numerous proposed adversarial example generating methods are ineffective in evading Mal2GCN. Moreover, we use the non-negative training method to transform Mal2GCN into a monotonically non-decreasing function; thereby, making it theoretically robust against appending attacks. Besides, experimental results on a collected dataset of PE executables demonstrate that Mal2GCN can detect malware with 98.15% accuracy, outperforming its counterparts. We then present a black-box source code-based adversarial malware generation approach that can be used to evaluate the robustness of malware detection models against real-world adversaries. This approach injects adversarial code into various locations of malware source code, aiming to evade malware detection models. The experiments indicate that Mal2GCN with non-negative weights achieves high accuracy in detecting Windows malware while also exhibiting robustness against adversarial attacks that add benign features to the malware source code.","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135476213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Use of cryptography in malware obfuscation 在恶意软件混淆中使用加密技术
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-25 DOI: 10.1007/s11416-023-00504-y
Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia
Malware authors often use cryptographic tools such as XOR encryption and block ciphers like AES to obfuscate part of the malware to evade detection. Use of cryptography may give the impression that these obfuscation techniques have some provable guarantees of success. In this paper, we take a closer look at the use of cryptographic tools to obfuscate malware. We first find that most techniques are easy to defeat (in principle), since the decryption algorithm and the key is shipped within the program. In order to clearly define an obfuscation technique’s potential to evade detection we propose a principled definition of malware obfuscation, and then categorize instances of malware obfuscation that use cryptographic tools into those which evade detection and those which are detectable. We find that schemes that are hard to de-obfuscate necessarily rely on a construct based on environmental keying. We also show that cryptographic notions of obfuscation, e.g., indistinghuishability and virtual black box obfuscation, may not guarantee evasion detection under our model. However, they can be used in conjunction with environmental keying to produce hard to de-obfuscate version of programs.
恶意软件作者经常使用加密工具,如异或加密和块密码,如AES来混淆部分恶意软件,以逃避检测。使用密码学可能会给人这样的印象:这些混淆技术有一些可证明的成功保证。在本文中,我们将仔细研究使用加密工具来混淆恶意软件。我们首先发现,大多数技术都很容易被攻破(原则上),因为解密算法和密钥是在程序中提供的。为了明确定义混淆技术逃避检测的潜力,我们提出了恶意软件混淆的原则定义,然后将使用加密工具的恶意软件混淆实例分为逃避检测的和可检测的。我们发现难以去混淆的方案必然依赖于基于环境键控的构造。我们还表明,在我们的模型下,混淆的密码学概念,例如,不可分辨性和虚拟黑盒混淆,可能无法保证逃避检测。然而,它们可以与环境键结合使用,以产生难以消除混淆的程序版本。
{"title":"Use of cryptography in malware obfuscation","authors":"Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia","doi":"10.1007/s11416-023-00504-y","DOIUrl":"https://doi.org/10.1007/s11416-023-00504-y","url":null,"abstract":"Malware authors often use cryptographic tools such as XOR encryption and block ciphers like AES to obfuscate part of the malware to evade detection. Use of cryptography may give the impression that these obfuscation techniques have some provable guarantees of success. In this paper, we take a closer look at the use of cryptographic tools to obfuscate malware. We first find that most techniques are easy to defeat (in principle), since the decryption algorithm and the key is shipped within the program. In order to clearly define an obfuscation technique’s potential to evade detection we propose a principled definition of malware obfuscation, and then categorize instances of malware obfuscation that use cryptographic tools into those which evade detection and those which are detectable. We find that schemes that are hard to de-obfuscate necessarily rely on a construct based on environmental keying. We also show that cryptographic notions of obfuscation, e.g., indistinghuishability and virtual black box obfuscation, may not guarantee evasion detection under our model. However, they can be used in conjunction with environmental keying to produce hard to de-obfuscate version of programs.","PeriodicalId":15545,"journal":{"name":"Journal of Computer Virology and Hacking Techniques","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135859173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computer Virology and Hacking Techniques
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1