Researchers Prove Malware Can Be Hidden Inside AI Models

Share post:

Researchers have discovered a new method of slipping malware past automated detention tools by hiding it in a neutral network.

To prove the validity of the technique, the researchers embellished 36.9 MiB of malware in a 178 MiB AlexaNet model without significantly altering the function of the model itself.

The malware-embedded model classified images with almost identical accuracy within 1% of the malware-free model.

By selecting the best layer to work with in an already trained model, and then embedding the malware in that layer, the researchers were able to break the malware in a way that allowed them to bypass detection by standard antivirus engines.

The new technique is a way to hide malware, not execute it. To actually execute the malware, it must be extracted from the poisoned model by another malicious program and then reassembled into its working form.

Researchers Zhi Wang, Chaoge Liu, and Xiang Cui made the discovery.

For more information, read the original story in Arstechnica.

SUBSCRIBE NOW

Related articles

Microsoft reveals critical security flaw affecting Android apps

Microsoft has identified a serious vulnerability in Android apps that could allow malicious software to hijack legitimate apps...

Chinese government websites “Riddled with security flaws” say researchers

A recent study conducted by researchers from the Harbin Institute of Technology reveals significant security issues plaguing Chinese...

Cyber Security Today, May 3, 2024 – North Korea exploits weak email DMARC settings, and the latest Verizon analysis of thousands of data breaches

This episode reports on warnings about threats from China, Russia and North Korea, the hack of Dropbox Sign's infrastructure

Hashtag Trending for World Password Day, Thursday, May 2nd, 2024

Security firm Okta warns of an unprecendented password stuffing attack that is piggybacking on regular user’s mobile and...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways