{"id":231958,"date":"2017-08-02T08:28:35","date_gmt":"2017-08-02T12:28:35","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/in-the-red-corner-malware-breeding-ai-and-in-the-blue-corner-the-ai-trying-to-stop-it-the-register.php"},"modified":"2022-08-24T08:07:32","modified_gmt":"2022-08-24T12:07:32","slug":"in-the-red-corner-malware-breeding-ai-and-in-the-blue-corner-the-ai-trying-to-stop-it-the-register","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/artificial-intelligence\/in-the-red-corner-malware-breeding-ai-and-in-the-blue-corner-the-ai-trying-to-stop-it-the-register.php","title":{"rendered":"In the red corner: Malware-breeding AI. And in the blue corner: The AI trying to stop it &#8211; The Register"},"content":{"rendered":"<p><p>    Script kid-ai ... What the malware-writing bot doesn't look    like  <\/p>\n<p>    Feature The magic AI wand has    been waved over language translation, and voice and image    recognition, and now: computer security.  <\/p>\n<p>    Antivirus makers want you to believe they are adding artificial    intelligence to their products: software that has learned how    to catch malware on a device. There are two potential problems    with that. Either it's marketing hype and not really AI  or    it's true, in which case don't forget that such systems can    still be hoodwinked.  <\/p>\n<p>    It's     relatively easy    to trick    machine-learning models  especially in image recognition.    Change a few pixels here and there, and an image of a bus can    be warped so that the machine thinks its an ostrich. Now take    that thought and extend it to so-called next-gen antivirus.  <\/p>\n<p>    Enter Endgame, a cyber-security biz based in Virginia, USA,    which you may recall     popped up at DEF CON this year. It has effectively pitted    two machine-learning systems against each other: one trained to    detect malware in downloaded files, and the other is trained to    customize malware so it slips past the aforementioned detector.    The aim is to craft software that can manipulate malware into    potentially undetectable samples, and then use those variants    to improve machine-learning-based scanners, creating a    constantly improving antivirus system.  <\/p>\n<p>    The key thing is recognizing that software classifiers  from    image recognition to antivirus  can suck, and that you have to    do something about it.  <\/p>\n<p>    Machine learning is not a one-stop shop solution for    security, said Hyrum Anderson, principal data scientist and    researcher at Endgame. He and his colleagues have teamed up    with researchers from the University of Virginia to create this    aforementioned cat and mouse game that breeds better and better    malware and learns from it.  <\/p>\n<p>    When I tell people what Im trying to do, it raises eyebrows,    Anderson told TheRegister. People ask me, Youre    trying to do what now? But let me explain.  <\/p>\n<p>    A lot of data is required to train machine learning models. It    took ImageNet  which contains tens    of millions of pictures split into thousands of categories  to    boost image recognition models to the performance possible    today.  <\/p>\n<p>    The goal of the antivirus game is to generate adversarial    samples to harden future machine learning models against    increasingly stealthy malware.  <\/p>\n<p>    To understand how this works, imagine a software agent learning    to play the game Breakout, Hyrum says. The classic arcade game    is simple. An agent controls a paddle, moving it left or right    to hit a ball bouncing back and forth from a brick wall. Every    time the ball strikes a brick, it disappears and the agent    scores a point. To win the game, the brick wall has to be    cleared and the agent has to continuously bat the ball and    prevent it from falling to the bottom of the screen.  <\/p>\n<p>    Endgames malware game is somewhat similar, but instead of a    ball the bot is dealing with malicious Windows executables. The    aim of the game is to fudge the file, changing bytes here and    there, in a way so that it hoodwinks an antivirus engine into    thinking the harmful file is safe. The poisonous file slips    through  like the ball carving a path through the brick wall    in Breakout  and the bot gets a point.  <\/p>\n<p>    It does this by manipulating the contents, and changing the    bytes in the malware, but the resulting data must still be    executable and fulfill its purpose after it passes through the    AV engine. In other words, the malware-generating agent can't    output a corrupted executable that slips past the scanner but,    due to deformities introduced in the binary to evade detection,    it crashes or doesn't work properly when run.  <\/p>\n<p>    The virus-cooking bot is rewarded for getting working malicious    files past the antivirus engine, so over time it learns the    best sequence of moves for changing a malicious files in a way    that it still functions and yet tricks the AV engine into    thinking the file is friendly.  <\/p>\n<p>    Its a much more difficult challenge than tricking image    recognition models. The file still has to be able to perform    the same function and have the same format. Were trying to    mimic what a real adversary could do if they didnt have the    source code, says Hyrum.  <\/p>\n<p>    Its a method of brute force. The agent and the AV engine are    trained on 100,000 input malware seeds  after training, 200    malware files are given to the agent to tamper with. These    samples were then fed into the AV engine and about 16per    cent of evil files dodged the scanner, we're told. That seems    low, but imagine crafting a strain of spyware that is    downloaded and run a million times: that turns into 160,000    potentially infected systems to your control. Not bad.  <\/p>\n<p>    After the antivirus engine model was updated and retrained    using those 200 computer-customized files, and it was given    another fresh 200 samples churned from the virus-tweaking    agent, the evasion rate dropped to half as the scanner got wise    to the agent's tricks.  <\/p>\n<p>    Sponsored:     The Joy and Pain of Buying IT - Have Your Say  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.theregister.co.uk\/2017\/08\/02\/ai_for_better_malware\/\" title=\"In the red corner: Malware-breeding AI. And in the blue corner: The AI trying to stop it - The Register\">In the red corner: Malware-breeding AI. And in the blue corner: The AI trying to stop it - The Register<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Script kid-ai ... What the malware-writing bot doesn't look like Feature The magic AI wand has been waved over language translation, and voice and image recognition, and now: computer security <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/artificial-intelligence\/in-the-red-corner-malware-breeding-ai-and-in-the-blue-corner-the-ai-trying-to-stop-it-the-register.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[13],"tags":[],"class_list":["post-231958","post","type-post","status-publish","format-standard","hentry","category-artificial-intelligence"],"modified_by":"Danzig","_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/231958"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=231958"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/231958\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=231958"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=231958"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=231958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}