🖍️
Pesidious
  • Introduction
  • Pre-requisites
  • Train Models (optional)
  • Mutate Malware
  • HowTo
    • Design your own RL agent
    • Train models against your custom classifier
    • Add more mutations
  • Conclusion
Powered by GitBook
On this page
  • Built With
  • Acknowledgments
  • References

Was this helpful?

Conclusion

PreviousAdd more mutations

Last updated 4 years ago

Was this helpful?

Built With

  • - Open source machine learning library based on the Torch library.

  • - A cross-platform library that can parse and abstract ELF, PE and MachO formats.

  • - PE library for rebuilding PE files, written in C++.

  • - Malware manipulation environment for OpenAI's gym.

  • - Adversarial Malware Generation Using GANs.

Acknowledgments

  • Gym-Malware Environment: . The environment was modified to add GAN and the mutations were added/changed/removed to improve the evasiveness of the malware and maintain functionality.

  • Yanming Lai's () and

  • Zayd Hammoudeh's () work on implementation on Han and Tan's MalGAN played a crucial role in our understanding of the architecture. A majority of the implementation of the MalGAN used in this project has been forked off Hammoudeh's work.

References

  • Anderson, H., Kharkar, A., Filar, B., Evans, D. and Roth, P. (2018). Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning. [online] arXiv.org. Available at: .

  • Docs.microsoft.com. (n.d.). PE Format - Windows applications. [online] Available at: .

  • Fang, Z., Wang, J., Li, B., Wu, S., Zhou, Y. and Huang, H. (2019). Evading Anti-Malware Engines With Deep Reinforcement Learning. [online] Ieeexplore.ieee.org. Available at: [Accessed 25 Aug. 2019]. . (2019).

  • Malware Researcher’s Handbook (Demystifying PE File). [online] Available at: .

  • Hu, W. and Tan, Y. (2018). Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN. [online] arXiv.org. Available at: .

PyTorch
Lief
PE Bliss
Gym-Malware
MalwareGAN
https://github.com/endgameinc/gym-malware
https://github.com/yanminglai/Malware-GAN
https://github.com/ZaydH/MalwareGAN
https://arxiv.org/abs/1801.08917
https://docs.microsoft.com/en-us/windows/win32/debug/pe-format#general-concepts
https://ieeexplore.ieee.org/abstract/document/8676031
https://resources.infosecinstitute.com
https://resources.infosecinstitute.com/2-malware-researchers-handbook-demystifying-pe-file/#gref
https://arxiv.org/abs/1702.05983