SeqNinja : automatic payload re-construction and manipulation in sequence-based android adversarial attack

The increasing trend of using learning-based Android malware detectors has resulted in a rise in the adversarial attack against such detectors. Despite Artificial Intelligence having high capability, it lacks robustness against adversarial attacks. As such, many learning-based detectors have come ou...

Full description

Bibliographic Details
Main Author: Ang, Hao Jie
Other Authors: Liu Yang
Format: Final Year Project (FYP)
Language:English
Published: Nanyang Technological University 2021
Subjects:
Online Access:https://hdl.handle.net/10356/148000
_version_ 1826115738329415680
author Ang, Hao Jie
author2 Liu Yang
author_facet Liu Yang
Ang, Hao Jie
author_sort Ang, Hao Jie
collection NTU
description The increasing trend of using learning-based Android malware detectors has resulted in a rise in the adversarial attack against such detectors. Despite Artificial Intelligence having high capability, it lacks robustness against adversarial attacks. As such, many learning-based detectors have come out with ways to defend against them. Currently, many of the adversarial attacking tools readily available only inject dead code, which can never be executed, and require to inject many benign features into a malicious APK. This can easily be noticeable by program analysis techniques to detect dead code. As such, SeqNinja aims to bring the adversarial attack to the next level by injecting a payload that allows execution without breaking the app’s original functionalities. These payloads are obtained from benign APK at Smali level and normalized into usable code snippets. The extracted Smali codes are carefully selected by filtering out ‘user-visible’ APIs or Intents. As such, payloads are able to be executed without any visible change noticeable by the user. Extracting Smali code from any benign APKs also allows many varieties of payloads as compared to other adversarial tools that use limited customized payloads stored in a database. Payloads can be injected into any location of the file based on sequence position or on the launcher class. Experiments were conducted to prove that randomly extracted payloads from any benign apps are able to execute without causing any ‘user-visible’ behaviors or crashing the app when running the app in an Android emulator.
first_indexed 2024-10-01T04:00:04Z
format Final Year Project (FYP)
id ntu-10356/148000
institution Nanyang Technological University
language English
last_indexed 2024-10-01T04:00:04Z
publishDate 2021
publisher Nanyang Technological University
record_format dspace
spelling ntu-10356/1480002021-04-22T04:51:37Z SeqNinja : automatic payload re-construction and manipulation in sequence-based android adversarial attack Ang, Hao Jie Liu Yang School of Computer Science and Engineering yangliu@ntu.edu.sg Engineering::Computer science and engineering::Computing methodologies The increasing trend of using learning-based Android malware detectors has resulted in a rise in the adversarial attack against such detectors. Despite Artificial Intelligence having high capability, it lacks robustness against adversarial attacks. As such, many learning-based detectors have come out with ways to defend against them. Currently, many of the adversarial attacking tools readily available only inject dead code, which can never be executed, and require to inject many benign features into a malicious APK. This can easily be noticeable by program analysis techniques to detect dead code. As such, SeqNinja aims to bring the adversarial attack to the next level by injecting a payload that allows execution without breaking the app’s original functionalities. These payloads are obtained from benign APK at Smali level and normalized into usable code snippets. The extracted Smali codes are carefully selected by filtering out ‘user-visible’ APIs or Intents. As such, payloads are able to be executed without any visible change noticeable by the user. Extracting Smali code from any benign APKs also allows many varieties of payloads as compared to other adversarial tools that use limited customized payloads stored in a database. Payloads can be injected into any location of the file based on sequence position or on the launcher class. Experiments were conducted to prove that randomly extracted payloads from any benign apps are able to execute without causing any ‘user-visible’ behaviors or crashing the app when running the app in an Android emulator. Bachelor of Engineering (Computer Engineering) 2021-04-22T04:51:37Z 2021-04-22T04:51:37Z 2021 Final Year Project (FYP) Ang, H. J. (2021). SeqNinja : automatic payload re-construction and manipulation in sequence-based android adversarial attack. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/148000 https://hdl.handle.net/10356/148000 en SCSE20-0192 application/pdf Nanyang Technological University
spellingShingle Engineering::Computer science and engineering::Computing methodologies
Ang, Hao Jie
SeqNinja : automatic payload re-construction and manipulation in sequence-based android adversarial attack
title SeqNinja : automatic payload re-construction and manipulation in sequence-based android adversarial attack
title_full SeqNinja : automatic payload re-construction and manipulation in sequence-based android adversarial attack
title_fullStr SeqNinja : automatic payload re-construction and manipulation in sequence-based android adversarial attack
title_full_unstemmed SeqNinja : automatic payload re-construction and manipulation in sequence-based android adversarial attack
title_short SeqNinja : automatic payload re-construction and manipulation in sequence-based android adversarial attack
title_sort seqninja automatic payload re construction and manipulation in sequence based android adversarial attack
topic Engineering::Computer science and engineering::Computing methodologies
url https://hdl.handle.net/10356/148000
work_keys_str_mv AT anghaojie seqninjaautomaticpayloadreconstructionandmanipulationinsequencebasedandroidadversarialattack