A Malware Adversarial Sample Generation Method Combined with API Fuzzing Technology
A malware and obfuscation technology, applied in the direction of electrical digital data processing, genetic rules, genetic models, etc., can solve the problem that it is difficult to ensure that the malware function is not damaged, the malware classifier has a high success rate of deception, and it is impossible to create an adversarial sample and other problems to achieve the effect of improving the damage of malicious software functions, improving the low success rate of deception, and meeting the actual needs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] In order to better illustrate the purpose and advantages of the present invention, the embodiments of the method of the present invention will be described in further detail below with reference to examples.
[0027] The specific process is:
[0028] Step 1: Insert irrelevant API vectors into the original API call sequence, and generate malware feature vector X according to the modified API call sequence P , which initially realizes the obfuscation of malware features by adding redundant code.
[0029] Step 1.1, determine an ordered set V, which contains all the API functions that the PE program can call.
[0030] Step 1.2, let l be the length of the API call sequence used in the attack, X be the API malicious sequence of length l, and divide X into w of length n j ,in n is w j The number of API calls in each w j Randomly chooses an API position i ∈ {1…n} in , and inserts an API vector at position i: where ⊥ represents the concatenation operation, After ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


