SeqNinja : automatic payload re-construction and manipulation in sequence-based android adversarial attack

The increasing trend of using learning-based Android malware detectors has resulted in a rise in the adversarial attack against such detectors. Despite Artificial Intelligence having high capability, it lacks robustness against adversarial attacks. As such, many learning-based detectors have come ou...

Full description

Saved in:
Bibliographic Details
Main Author: Ang, Hao Jie
Other Authors: Liu Yang
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2021
Subjects:
Online Access:https://hdl.handle.net/10356/148000
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-148000
record_format dspace
spelling sg-ntu-dr.10356-1480002021-04-22T04:51:37Z SeqNinja : automatic payload re-construction and manipulation in sequence-based android adversarial attack Ang, Hao Jie Liu Yang School of Computer Science and Engineering yangliu@ntu.edu.sg Engineering::Computer science and engineering::Computing methodologies The increasing trend of using learning-based Android malware detectors has resulted in a rise in the adversarial attack against such detectors. Despite Artificial Intelligence having high capability, it lacks robustness against adversarial attacks. As such, many learning-based detectors have come out with ways to defend against them. Currently, many of the adversarial attacking tools readily available only inject dead code, which can never be executed, and require to inject many benign features into a malicious APK. This can easily be noticeable by program analysis techniques to detect dead code. As such, SeqNinja aims to bring the adversarial attack to the next level by injecting a payload that allows execution without breaking the app’s original functionalities. These payloads are obtained from benign APK at Smali level and normalized into usable code snippets. The extracted Smali codes are carefully selected by filtering out ‘user-visible’ APIs or Intents. As such, payloads are able to be executed without any visible change noticeable by the user. Extracting Smali code from any benign APKs also allows many varieties of payloads as compared to other adversarial tools that use limited customized payloads stored in a database. Payloads can be injected into any location of the file based on sequence position or on the launcher class. Experiments were conducted to prove that randomly extracted payloads from any benign apps are able to execute without causing any ‘user-visible’ behaviors or crashing the app when running the app in an Android emulator. Bachelor of Engineering (Computer Engineering) 2021-04-22T04:51:37Z 2021-04-22T04:51:37Z 2021 Final Year Project (FYP) Ang, H. J. (2021). SeqNinja : automatic payload re-construction and manipulation in sequence-based android adversarial attack. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/148000 https://hdl.handle.net/10356/148000 en SCSE20-0192 application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Computer science and engineering::Computing methodologies
spellingShingle Engineering::Computer science and engineering::Computing methodologies
Ang, Hao Jie
SeqNinja : automatic payload re-construction and manipulation in sequence-based android adversarial attack
description The increasing trend of using learning-based Android malware detectors has resulted in a rise in the adversarial attack against such detectors. Despite Artificial Intelligence having high capability, it lacks robustness against adversarial attacks. As such, many learning-based detectors have come out with ways to defend against them. Currently, many of the adversarial attacking tools readily available only inject dead code, which can never be executed, and require to inject many benign features into a malicious APK. This can easily be noticeable by program analysis techniques to detect dead code. As such, SeqNinja aims to bring the adversarial attack to the next level by injecting a payload that allows execution without breaking the app’s original functionalities. These payloads are obtained from benign APK at Smali level and normalized into usable code snippets. The extracted Smali codes are carefully selected by filtering out ‘user-visible’ APIs or Intents. As such, payloads are able to be executed without any visible change noticeable by the user. Extracting Smali code from any benign APKs also allows many varieties of payloads as compared to other adversarial tools that use limited customized payloads stored in a database. Payloads can be injected into any location of the file based on sequence position or on the launcher class. Experiments were conducted to prove that randomly extracted payloads from any benign apps are able to execute without causing any ‘user-visible’ behaviors or crashing the app when running the app in an Android emulator.
author2 Liu Yang
author_facet Liu Yang
Ang, Hao Jie
format Final Year Project
author Ang, Hao Jie
author_sort Ang, Hao Jie
title SeqNinja : automatic payload re-construction and manipulation in sequence-based android adversarial attack
title_short SeqNinja : automatic payload re-construction and manipulation in sequence-based android adversarial attack
title_full SeqNinja : automatic payload re-construction and manipulation in sequence-based android adversarial attack
title_fullStr SeqNinja : automatic payload re-construction and manipulation in sequence-based android adversarial attack
title_full_unstemmed SeqNinja : automatic payload re-construction and manipulation in sequence-based android adversarial attack
title_sort seqninja : automatic payload re-construction and manipulation in sequence-based android adversarial attack
publisher Nanyang Technological University
publishDate 2021
url https://hdl.handle.net/10356/148000
_version_ 1698713654539583488