EvilModel: Hiding Malware Inside of Neural Network Models
AI-generated Key Points
⚠The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.
- The paper introduces the EvilModel approach for hiding malware within neural network models
- Malicious code is embedded within neurons of neural networks to enable covert and evasive delivery of malware
- Utilizes characteristics of neural networks like lack of explainability and strong generalization capabilities to seamlessly integrate malware without impacting performance significantly
- Embedded malware instances can evade detection by traditional antivirus engines during security scans due to unchanged overall architecture of the neural network
- Experimental results demonstrate integration of 36.9MB of malware into a 178MB-AlexNet model with only a marginal 1% loss in accuracy
- Relevance in the context of increasing use of artificial intelligence technologies, emphasizing the importance of understanding and defending against potential attacks leveraging neural networks
- Authors aim for their work to guide development of defenses against cyber threats involving neural networks, stressing proactive measures to safeguard AI systems
Authors: Zhi Wang, Chaoge Liu, Xiang Cui
Abstract: Delivering malware covertly and evasively is critical to advanced malware campaigns. In this paper, we present a new method to covertly and evasively deliver malware through a neural network model. Neural network models are poorly explainable and have a good generalization ability. By embedding malware in neurons, the malware can be delivered covertly, with minor or no impact on the performance of neural network. Meanwhile, because the structure of the neural network model remains unchanged, it can pass the security scan of antivirus engines. Experiments show that 36.9MB of malware can be embedded in a 178MB-AlexNet model within 1% accuracy loss, and no suspicion is raised by anti-virus engines in VirusTotal, which verifies the feasibility of this method. With the widespread application of artificial intelligence, utilizing neural networks for attacks becomes a forwarding trend. We hope this work can provide a reference scenario for the defense on neural network-assisted attacks.
Ask questions about this paper to our AI assistant
You can also chat with multiple papers at once here.
⚠The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.
Assess the quality of the AI-generated content by voting
Score: 0
Why do we need votes?
Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.
Similar papers summarized with our AI tools
Navigate through even more similar papers through a
tree representationLook for similar papers (in beta version)
By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.
Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.