JOURNAL ARTICLE

On the effectiveness of transferability of adversarial Android malware samples against learning-based detectors

Abstract

In recent times, there has been a growing utilization of Machine Learning (ML) in the realm of malware detection. The Adversarial Example (AE) attack, widely acknowledged for undermining ML in diverse contexts, has demonstrated its effectiveness in evading or deceiving ML-based systems designed for malware detection. By ensuring the transferability of generated AEs, attacks can be enhanced to bypass various types of malware detection models. This research focuses on investigating the transferability of AEs generated by Generative Adversarial Networks (GANs) and assessing the resistance of ML-based Android malware detection against them. In addition, we provide experimental evidence demonstrating that GAN-generated AEs still retain their original functionality and malicious behaviors. To begin with, we establish ML models with high detection performance for malware. These models, which function as blackbox, form the foundation for generating AEs by effectively identifying malware. Furthermore, we utilize the previously mentioned model to build the discriminator, enhancing the transferability of the sample generator by ensuring the preservation of the functional and executable features of the file. Finally, AEs generated from each GAN model using different black-box detectors will be tested for their transferability capabilities on various targeted victim models.

Keywords:
Malware Computer science Transferability Adversarial system Android malware Machine learning Adversarial machine learning Android (operating system) Executable Artificial intelligence Computer security Operating system

Metrics

1
Cited By
0.27
FWCI (Field Weighted Citation Impact)
24
Refs
0.47
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Adversarial Robustness in Machine Learning
Physical Sciences →  Computer Science →  Artificial Intelligence
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
© 2026 ScienceGate Book Chapters — All rights reserved.