skip to main content
10.1145/3560830.3563726acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Quo Vadis: Hybrid Machine Learning Meta-Model Based on Contextual and Behavioral Malware Representations

Published: 07 November 2022 Publication History

Abstract

We propose a hybrid machine learning architecture that simultaneously employs multiple deep learning models analyzing contextual and behavioral characteristics of Windows portable executable, producing a final prediction based on a decision from the meta-model. The detection heuristic in contemporary machine learning Windows malware classifiers is typically based on the static properties of the sample since dynamic analysis through virtualization is challenging for vast quantities of samples. To surpass this limitation, we employ a Windows kernel emulation that allows the acquisition of behavioral patterns across large corpora with minimal temporal and computational costs. We partner with a security vendor for a collection of more than 100k int-the-wild samples that resemble the contemporary threat landscape, containing raw PE files and filepaths of applications at the moment of execution. The acquired dataset is at least ten folds larger than reported in related works on behavioral malware analysis. Files in the training dataset are labeled by a professional threat intelligence team, utilizing manual and automated reverse engineering tools. We estimate the hybrid classifier's operational utility by collecting an out-of-sample test set three months later from the acquisition of the training set. We report an improved detection rate, above the capabilities of the current state-of-the-art model, especially under low false-positive requirements. Additionally, we uncover a meta-model's ability to identify malicious activity in both validation and test sets even if none of the individual models express enough confidence to mark the sample as malevolent. We conclude that the meta-model can learn patterns typical to malicious samples out of representation combinations produced by different analysis techniques. Furthermore, we publicly release pre-trained models and anonymized dataset of emulation reports.

Supplementary Material

MP4 File (aisec22-213.mp4)
In this video, we present the architecture of the hybrid machine learning (ML) solution for a malware classification task. We outline the problems with ML solutions based on static features and discuss the necessity to additionally perform a contextual and dynamic analysis. The dataset structure is examined to delineate the scope of model generalization and set boundaries for its utility. We cover the evaluation of the model's performance on an out-of-sample test set, collected three months after the collection of the training set. An analysis is done as detection rates under fixed false positive rates, and conclusions are provided. Furthermore, adversarial robustness is discussed with trials based on malware generated with section injection attack. Finally, we outline ideas for future work and discuss the public release of the emulation dataset.

References

[1]
Abien Fred Agarap. 2019. Deep Learning using Rectified Linear Units (ReLU). arXiv:1803.08375 [cs.NE]
[2]
Rakshit Agrawal, Jack W. Stokes, Mady Marinescu, and Karthik Selvaraj. 2018. Robust Neural Malware Detection Models for Emulation Sequence Learning. arXiv:1806.10741 [cs.AI]
[3]
Hyrum S. Anderson, Anant Kharkar, Bobby Filar, David Evans, and Phil Roth. 2018. Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning. arXiv:1801.08917 [cs.CR]
[4]
Hyrum S. Anderson and Phil Roth. 2018. EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models. arXiv:1804.04637 [cs.CR]
[5]
Ben Athiwaratkun and Jack W. Stokes. 2017. Malware classification with LSTM and GRU language models and a character-level CNN. In 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). ICASSP, New Orleans, LA, USA, 2482--2486. https://doi.org/10.1109/ICASSP.2017.7952603
[6]
Jimmy Lei Ba, Jamie Ryan Kiros, and Geoffrey E. Hinton. 2016. Layer Normalization. https://doi.org/10.48550/ARXIV.1607.06450
[7]
Fabrice Bellard. 2005. QEMU, a Fast and Portable Dynamic Translator. In ATEC'05: Proceedings of the annual conference on USENIX Annual Technical Conference (Anaheim, CA) (ATEC '05). USENIX Association, USA, 41.
[8]
Tianqi Chen and Carlos Guestrin. 2016. XGBoost: A Scalable Tree Boosting System. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (San Francisco, California, USA) (KDD '16). ACM, New York, NY, USA, 785--794. https://doi.org/10.1145/2939672.2939785
[9]
Junyoung Chung, Caglar Gulcehre, KyungHyun Cho, and Yoshua Bengio. 2014. Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling. https://doi.org/10.48550/ARXIV.1412.3555
[10]
Djork-Arné Clevert, Thomas Unterthiner, and Sepp Hochreiter. 2015. Fast and Accurate Deep Network Learning by Exponential Linear Units (ELUs). https://doi.org/10.48550/ARXIV.1511.07289
[11]
Luca Demetrio and Battista Biggio. 2021. secml-malware: A Python Library for Adversarial Robustness Evaluation of Windows Malware Classifiers. arXiv:2104.12848 [cs.CR]
[12]
Luca Demetrio, Battista Biggio, Giovanni Lagorio, Fabio Roli, and Alessandro Armando. 2021. Functionality-Preserving Black-Box Optimization of Adversarial Windows Malware. IEEE Transactions on Information Forensics and Security 16 (2021), 3469--3478. https://doi.org/10.1109/tifs.2021.3082330
[13]
Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long Short-term Memory. Neural computation 9 (12 1997), 1735--80. https://doi.org/10.1162/neco.1997.9.8.1735
[14]
Sergey Ioffe and Christian Szegedy. 2015. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. arXiv:1502.03167 [cs.LG]
[15]
Guolin Ke, Qi Meng, Thomas Finley, Taifeng Wang, Wei Chen, Weidong Ma, Qiwei Ye, and Tie-Yan Liu. 2017. LightGBM: A Highly Efficient Gradient Boosting Decision Tree. In Advances in Neural Information Processing Systems, I. Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett (Eds.), Vol. 30. Curran Associates, Inc., Long Beach, CA. https://proceedings.neurips.cc/paper/2017/file/6449f44a102fde848669bdd9eb6b76fa-Paper.pdf
[16]
Diederik P. Kingma and Jimmy Ba. 2017. Adam: A Method for Stochastic Optimization. arXiv:1412.6980 [cs.LG]
[17]
Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, DavideMaiorca, Giorgio Giacinto, Claudia Eckert, and Fabio Roli. 2018. Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables. CoRR abs/1803.04173 (2018). arXiv:1803.04173 http://arxiv.org/abs/1803.04173
[18]
Bojan Kolosnjaji, Apostolis Zarras, George Webster, and Claudia Eckert. 2016. Deep Learning for Classification of Malware System Call Sequences. In AI 2016: Advances in Artificial Intelligence, Vol. 9992. 29th Australasian Joint Conference, Hobart, TAS, Australia, 137--149. https://doi.org/10.1007/978--3--319--50127--7_11
[19]
Yunus Kucuk and Guanhua Yan. 2020. Deceiving Portable Executable Malware Classifiers into Targeted Misclassification with Practical Adversarial Examples. Association for Computing Machinery, New York, NY, USA, 341--352. https://doi.org/10.1145/3374664.3375741
[20]
Adarsh Kyadige, Ethan M. Rudd, and Konstantin Berlin. 2020. Learning from Context: A Multi-View Deep Learning Architecture for Malware Detection. In 2020 IEEE Security and Privacy Workshops (SPW). IEEE, San Francisco, CA, USA, 1--7. https://doi.org/10.1109/SPW50608.2020.00018
[21]
Xigao Li, David Krisiloff, and Scott Coull. 2021. Lightweight, Emulation-Assisted Malware Classification.
[22]
Xinjian Ma, Qi Biao, Wu Yang, and Jianguo Jiang. 2016. Using multi-features to reduce false positive in malware classification. In 2016 IEEE Information Technology, Networking, Electronic and Automation Control Conference. IEEE Information Technology, San Francisco, CA, USA, 361--365. https://doi.org/10.1109/ITNEC.2016.7560382
[23]
Mandiant. 2021. Speakeasy: portable, modular, binary emulator designed to emulate Windows kernel and user mode malware. https://github.com/mandiant/speakeasy.
[24]
Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, Alban Desmaison, Andreas Kopf, Edward Yang, Zachary DeVito, Martin Raison, Alykhan Tejani, Sasank Chilamkurthy, Benoit Steiner, Lu Fang, Junjie Bai, and Soumith Chintala. 2019. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In Advances in Neural Information Processing Systems 32, H. Wallach, H. Larochelle, A. Beygelzimer, F. d'Alché-Buc, E. Fox, and R. Garnett (Eds.). Curran Associates, Inc., pytorch.org, 8024--8035.
[25]
F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research 12 (2011), 2825--2830.
[26]
Edward Raff, Jon Barker, Jared Sylvester, Robert Brandon, Bryan Catanzaro, and Charles Nicholas. 2017. Malware Detection by Eating a Whole EXE. arXiv:1710.09435 [stat.ML]
[27]
Edward Raff, Bobby Filar, and James Holt. 2020. Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors. https://doi.org/ 10.48550/ARXIV.2010.12080
[28]
Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, and Lior Rokach. 2020. Query- Efficient Black-Box Attack Against Sequence-Based Malware Classifiers. In Annual Computer Security Applications Conference (Austin, USA) (ACSAC '20). Association for Computing Machinery, New York, NY, USA, 611--626. https://doi.org/10.1145/3427228.3427230
[29]
Ethan M. Rudd, Felipe N. Ducau, Cody Wild, Konstantin Berlin, and Richard Harang. 2019. ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation. arXiv:1903.05700 [cs.CR]
[30]
Joshua Saxe and Konstantin Berlin. 2017. eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys. arXiv:1702.08568 [cs.CR]
[31]
Matthew Schultz, Eleazar Eskin, F. Zadok, and Salvatore Stolfo. 2001. Data Mining Methods for Detection of New Malicious Executables, In Proceedings 2001 IEEE Symposium on Security and Privacy. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy 1, 1, 38--49. https://doi.org/10.1109/SECPRI.2001.924286
[32]
P.V. Shijo and A. Salim. 2015. Integrated Static and Dynamic Analysis for Malware Detection. Procedia Computer Science 46 (2015), 804--811. https://doi.org/10.1016/j.procs.2015.02.149 Proceedings of the International Conference on Information and Communication Technologies, ICICT 2014, 3--5 December 2014 at Bolgatty Palace & Island Resort, Kochi, India.
[33]
Rami Sihwail, Khairuddin Omar, and KA Zainol Ariffin. 2018. A survey on malware analysis techniques: Static, dynamic, hybrid and memory analysis. Int. J. Adv. Sci. Eng. Inf. Technol 8, 4--2 (2018), 1662--1671.
[34]
Wei Song, Xuezixiang Li, Sadia Afroz, Deepali Garg, Dmitry Kuznetsov, and Heng Yin. 2021. MAB-Malware: A Reinforcement Learning Framework for Attacking Static Malware Classifiers. arXiv:2003.03100 [cs.CR]
[35]
Anuj Soni and Lenny Zeltser. 2021. FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques.
[36]
Nitish Srivastava, Geoffrey Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. 2014. Dropout: A Simple Way to Prevent Neural Networks from Overfitting. Journal of Machine Learning Research 15, 56 (2014), 1929--1958. http://jmlr.org/papers/v15/srivastava14a.html
[37]
Daniele Ucci, Leonardo Aniello, and Roberto Baldoni. 2019. Survey of machine learning techniques for malware analysis. Computers & Security 81 (2019), 123--147.
[38]
Ming Chuan Yang and Meng Chang Chen. 2019. Theoretical Investigation of Composite Neural Network. arXiv:1910.09351 [cs.LG]
[39]
Yao Saint Yen, Zhe Wei Chen, Ying Ren Guo, and Meng Chang Chen. 2019. Integration of Static and Dynamic Analysis for Malware Family Classification with Composite Neural Network. arXiv:1912.11249 [cs.CR]
[40]
Wenpeng Yin, Katharina Kann, Mo Yu, and Hinrich Schütze. 2017. Comparative Study of CNN and RNN for Natural Language Processing. https://doi.org/10.48550/ARXIV.1702.01923

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
AISec'22: Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security
November 2022
168 pages
ISBN:9781450398800
DOI:10.1145/3560830
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 November 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. convolutions
  2. emulation
  3. malware
  4. neural networks
  5. reverse engineering

Qualifiers

  • Research-article

Conference

CCS '22
Sponsor:

Acceptance Rates

Overall Acceptance Rate 94 of 231 submissions, 41%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)138
  • Downloads (Last 6 weeks)20
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media