EvilModel 2.0: Bringing Neural Network Models into Malware Attacks

AI-generated keywords: Artificial Intelligence Security Concerns Stegomalware Neural Network Models EvilModel

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • Security concerns in artificial intelligence (AI) are increasing as technology advances
  • Previous research explored converting neural network models into stegomalware
  • Existing techniques have limitations in real-world attack scenarios, leading to performance degradation and increased workload
  • EvilModel is a new stegomalware with three novel embedding methods: MSB reservation, fast substitution, and half substitution
  • EvilModel allows seamless integration of malware occupying up to half of the model's volume while maintaining optimal performance
  • 550 EvilModels demonstrated an impressive embedding rate of 48.52%
  • A quantitative algorithm was developed to evaluate existing embedding methods
  • A trigger mechanism was designed for targeted attacks using EvilModel
  • Extensive experiments showed the practicality and efficacy of EvilModel in terms of embedding capacity, performance impact, and detection evasion
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Zhi Wang, Chaoge Liu, Xiang Cui, Jie Yin, Xutong Wang

Computers & Security (2022): 102807
A newer version of this paper has been accepted at Computers & Security. Free access to the final version at https://authors.elsevier.com/c/1fJhFc43uylbS before August 16, 2022. This paper is an extended version of work that was first presented at the 26th IEEE Symposium on Computers and Communications (ISCC 2021)
License: CC BY-NC-ND 4.0

Abstract: Security issues have gradually emerged with the continuous development of artificial intelligence (AI). Earlier work verified the possibility of converting neural network models into stegomalware, embedding malware into a model with limited impact on the model's performance. However, existing methods are not applicable in real-world attack scenarios and do not attract enough attention from the security community due to performance degradation and additional workload. Therefore, we propose an improved stegomalware EvilModel. By analyzing the composition of the neural network model, three new methods for embedding malware into the model are proposed: MSB reservation, fast substitution, and half substitution, which can embed malware that accounts for half of the model's volume without affecting the model's performance. We built 550 EvilModels using ten mainstream neural network models and 19 malware samples. The experiment shows that EvilModel achieved an embedding rate of 48.52\%. A quantitative algorithm is proposed to evaluate the existing embedding methods. We also design a trigger and propose a threat scenario for the targeted attack. The practicality and effectiveness of the proposed methods were demonstrated by experiments and analyses of the embedding capacity, performance impact, and detection evasion.

Submitted to arXiv on 09 Sep. 2021

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2109.04344v3

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

In the realm of artificial intelligence (AI), security concerns have become increasingly prevalent as technology continues to advance. Previous research has explored the potential for converting neural network models into stegomalware, a method of embedding malware within a model without significantly impacting its performance. However, existing techniques have limitations when applied in real-world attack scenarios, often leading to performance degradation and increased workload. To address these challenges, a new and improved stegomalware known as EvilModel has been proposed. EvilModel introduces three novel methods for embedding malware into neural network models: MSB reservation, fast substitution, and half substitution. These techniques allow for the seamless integration of malware that occupies up to half of the model's volume while maintaining optimal performance. Through the creation of 550 EvilModels using various mainstream neural network models and malware samples, it was demonstrated that EvilModel achieved an impressive embedding rate of 48.52%. To evaluate the effectiveness of existing embedding methods, a quantitative algorithm was developed. Additionally, a trigger mechanism was designed to initiate targeted attacks using EvilModel, presenting a potential threat scenario. Through extensive experiments and analyses focusing on embedding capacity, performance impact, and detection evasion, the practicality and efficacy of EvilModel were successfully demonstrated. Authored by Zhi Wang, Chaoge Liu, Xiang Cui Jie Yin,and Xutong Wang,this groundbreaking research sheds light on the evolving landscape of AI security and offers innovative solutions for safeguarding neural network models against malicious attacks. The study has been published in Computers & Security (2022) under the DOI 10.1016/j.cose.2022.102807and represents an extended version of work initially presented at the 26th IEEE Symposium on Computers and Communications (ISCC 2021).
Created on 11 Sep. 2024

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.