A Survey on Adversarial Attacks for Malware Analysis

Machine learning-based malware analysis approaches are widely researched and deployed in critical infrastructures for detecting and classifying evasive and growing malware threats. However, minor perturbations or ineffectual byte insertions can easily ‘fool’ these trained ML cl...

Full description

Saved in:
Bibliographic Details
Main Authors: Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Pradip Kunwar, Bhavani Thuraisingham
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10806701/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841563317226700800
author Kshitiz Aryal
Maanak Gupta
Mahmoud Abdelsalam
Pradip Kunwar
Bhavani Thuraisingham
author_facet Kshitiz Aryal
Maanak Gupta
Mahmoud Abdelsalam
Pradip Kunwar
Bhavani Thuraisingham
author_sort Kshitiz Aryal
collection DOAJ
description Machine learning-based malware analysis approaches are widely researched and deployed in critical infrastructures for detecting and classifying evasive and growing malware threats. However, minor perturbations or ineffectual byte insertions can easily ‘fool’ these trained ML classifiers, making them ineffective against these crafted and smart malicious software. This survey aims to provide an encyclopedic overview of adversarial evasion attacks specifically targeting malware detection and classification systems, standing apart from previous surveys by focusing exclusively and comprehensively on this unique application domain. While significant strides have been made in adversarial research in other fields, the specific challenges of adversarial malware remain under-explored due to the intricate nature and constraints of the malware domain. Our survey addresses this gap by analyzing literature on adversarial evasion attacks published between 2013 and 2024, making it one of the first to systematically focus on malware-specific adversarial attacks in a detailed, self-contained manner. The paper will begin by introducing various machine-learning techniques used to generate adversarial malware samples, including the structural nuances of target files, which influence adversarial vulnerabilities. The work presents an in-depth threat model specific to adversarial malware evasion attacks, describing the unique attack surfaces of malware detectors and outlining adversarial goals tailored to the malware domain. We systematically analyze adversarial generation algorithms from broader domains adapted to malware evasion attacks, proposing a taxonomy of adversarial evasion attacks within malware detection based on target domains(Windows, Android and PDF). The survey highlights real-world adversarial evasion attacks on machine learning-based anti-malware engines under each taxonomical heading, demonstrating the evolution and refinement of these attack strategies over time. Our survey outlines current limitations and practical challenges in executing adversarial attacks against malware detectors in real-world environments. We identify open problems and propose future research directions for developing more practical, robust, efficient, and generalized adversarial attacks on ML-based malware classifiers.
format Article
id doaj-art-af186503dad84b648036f8332073875d
institution Kabale University
issn 2169-3536
language English
publishDate 2025-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-af186503dad84b648036f8332073875d2025-01-03T00:01:50ZengIEEEIEEE Access2169-35362025-01-011342845910.1109/ACCESS.2024.351952410806701A Survey on Adversarial Attacks for Malware AnalysisKshitiz Aryal0https://orcid.org/0000-0001-8000-1086Maanak Gupta1https://orcid.org/0000-0001-9189-2478Mahmoud Abdelsalam2https://orcid.org/0000-0001-5627-5239Pradip Kunwar3https://orcid.org/0009-0004-2583-5925Bhavani Thuraisingham4Department of Computer Science, Tennessee Technological University, Cookeville, TN, USADepartment of Computer Science, Tennessee Technological University, Cookeville, TN, USADepartment of Computer Science, North Carolina A&T State University, Greensboro, NC, USADepartment of Computer Science, Tennessee Technological University, Cookeville, TN, USADepartment of Computer Science, The University of Texas at Dallas, Dallas, TX, USAMachine learning-based malware analysis approaches are widely researched and deployed in critical infrastructures for detecting and classifying evasive and growing malware threats. However, minor perturbations or ineffectual byte insertions can easily ‘fool’ these trained ML classifiers, making them ineffective against these crafted and smart malicious software. This survey aims to provide an encyclopedic overview of adversarial evasion attacks specifically targeting malware detection and classification systems, standing apart from previous surveys by focusing exclusively and comprehensively on this unique application domain. While significant strides have been made in adversarial research in other fields, the specific challenges of adversarial malware remain under-explored due to the intricate nature and constraints of the malware domain. Our survey addresses this gap by analyzing literature on adversarial evasion attacks published between 2013 and 2024, making it one of the first to systematically focus on malware-specific adversarial attacks in a detailed, self-contained manner. The paper will begin by introducing various machine-learning techniques used to generate adversarial malware samples, including the structural nuances of target files, which influence adversarial vulnerabilities. The work presents an in-depth threat model specific to adversarial malware evasion attacks, describing the unique attack surfaces of malware detectors and outlining adversarial goals tailored to the malware domain. We systematically analyze adversarial generation algorithms from broader domains adapted to malware evasion attacks, proposing a taxonomy of adversarial evasion attacks within malware detection based on target domains(Windows, Android and PDF). The survey highlights real-world adversarial evasion attacks on machine learning-based anti-malware engines under each taxonomical heading, demonstrating the evolution and refinement of these attack strategies over time. Our survey outlines current limitations and practical challenges in executing adversarial attacks against malware detectors in real-world environments. We identify open problems and propose future research directions for developing more practical, robust, efficient, and generalized adversarial attacks on ML-based malware classifiers.https://ieeexplore.ieee.org/document/10806701/Adversarial evasion attackadversary modelingsecurity for AIwindows PE malwareAndroid malwarePDF malware
spellingShingle Kshitiz Aryal
Maanak Gupta
Mahmoud Abdelsalam
Pradip Kunwar
Bhavani Thuraisingham
A Survey on Adversarial Attacks for Malware Analysis
IEEE Access
Adversarial evasion attack
adversary modeling
security for AI
windows PE malware
Android malware
PDF malware
title A Survey on Adversarial Attacks for Malware Analysis
title_full A Survey on Adversarial Attacks for Malware Analysis
title_fullStr A Survey on Adversarial Attacks for Malware Analysis
title_full_unstemmed A Survey on Adversarial Attacks for Malware Analysis
title_short A Survey on Adversarial Attacks for Malware Analysis
title_sort survey on adversarial attacks for malware analysis
topic Adversarial evasion attack
adversary modeling
security for AI
windows PE malware
Android malware
PDF malware
url https://ieeexplore.ieee.org/document/10806701/
work_keys_str_mv AT kshitizaryal asurveyonadversarialattacksformalwareanalysis
AT maanakgupta asurveyonadversarialattacksformalwareanalysis
AT mahmoudabdelsalam asurveyonadversarialattacksformalwareanalysis
AT pradipkunwar asurveyonadversarialattacksformalwareanalysis
AT bhavanithuraisingham asurveyonadversarialattacksformalwareanalysis
AT kshitizaryal surveyonadversarialattacksformalwareanalysis
AT maanakgupta surveyonadversarialattacksformalwareanalysis
AT mahmoudabdelsalam surveyonadversarialattacksformalwareanalysis
AT pradipkunwar surveyonadversarialattacksformalwareanalysis
AT bhavanithuraisingham surveyonadversarialattacksformalwareanalysis