Abstract
The main goal of this study is to investigate the robustness of graphbased Deep Learning (DL) models used for Internet of Things (IoT) malware classification against Adversarial Learning (AL). We designed two approaches to craft adversarial IoT software, including Off-the-Shelf Adversarial Attack (OSAA) methods, using six different AL attack approaches, and Graph Embedding and Augmentation (GEA). The GEA approach aims to preserve the functionality and practicality of the generated adversarial sample through a careful embedding of a benign sample to a malicious one. Our evaluations demonstrate that OSAAs are able to achieve a misclassification rate (MR) of 100%. Moreover, we observed that the GEA approach is able to misclassify all IoT malware samples as benign.
Original language | English |
---|---|
Title of host publication | WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks |
Publisher | Association for Computing Machinery, Inc |
Pages | 290-291 |
Number of pages | 2 |
ISBN (Electronic) | 9781450367264 |
DOIs | |
Publication status | Published - 15 May 2019 |
Event | 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019 - Miami, United States Duration: 15 May 2019 → 17 May 2019 |
Publication series
Name | WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks |
---|
Conference
Conference | 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019 |
---|---|
Country/Territory | United States |
City | Miami |
Period | 15/05/19 → 17/05/19 |
Bibliographical note
Publisher Copyright:© 2019 Copyright held by the owner/author(s).
Keywords
- Adversarial Learning
- Deep Learning
- Graph Analysis
- Internet of Things
- Malware Detection