Friday, March 28, 2025
HomeAndroidStealthy Steganography Backdoor Attacks Target Android Apps

Stealthy Steganography Backdoor Attacks Target Android Apps

Published on

SIEM as a Service

Follow Us on Google News

BARWM, a novel backdoor attack approach for real-world deep learning (DL) models deployed on mobile devices. Existing backdoor attacks often suffer from limitations such as altering the model structure or relying on easily detectable, sample-agnostic triggers. 

By utilizing DNN-based steganography to generate sample-specific backdoor triggers that are imperceptible, it is able to circumvent these limitations.

The research first extracts real-world DL models from mobile apps and analyzes them to understand their functionality, which are then converted into trainable models while preserving their original behavior. 

The core of BARWM lies in its use of a DNN-based steganography technique to generate unique and imperceptible triggers for each input sample, which significantly enhances the stealthiness of the attack as it makes it harder to identify and mitigate.

The overview architecture of BARWM
The overview architecture of BARWM

The authors rigorously evaluate BARWM on four state-of-the-art DNN models and compare its performance with existing methods, including DeepPayload and two other typical backdoor attack approaches. 

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

The results demonstrate that BARWM outperforms these baselines in terms of both attack success rate and stealthiness, as it achieves a higher attack success rate while maintaining the normal performance of the models, and the generated backdoor triggers are significantly more difficult to detect compared to those produced by other methods.

They also conduct experiments on real-world DL models extracted from mobile apps and the results show that BARWM exhibits superior effectiveness and robustness in these real-world scenarios.

The normal TFLite model and the TFLite model after being attacked by DeepPayload
The normal TFLite model and the TFLite model after being attacked by DeepPayload

The paper presents a significant contribution to the field of backdoor attacks, as BARWM demonstrates the potential for highly effective and stealthy attacks on real-world DL models, highlighting the critical need for robust defense mechanisms to safeguard the security and privacy of these increasingly prevalent systems.

BARWM, a novel backdoor attack technique that leverages DNN-based steganography to generate imperceptible and sample-specific triggers for real-world deep learning models. 

By employing a DNN to embed hidden messages within images, BARWM creates unique and nearly undetectable backdoors for each input sample, significantly enhancing the stealthiness of the attack. 

A number of different DNN models, including those that were extracted from real-world mobile applications, were subjected to stringent evaluation by the researchers. 

Results demonstrate that BARWM outperforms existing methods, achieving higher attack success rates while maintaining the normal performance of the models and significantly improving upon the stealthiness of previous backdoor attacks. 

The findings highlight the critical need for robust defense mechanisms to mitigate the growing threat of sophisticated backdoor attacks on increasingly prevalent deep learning systems.

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Meta AI Expands to 41 European Countries in New Rollout

Meta AI has announced its rollout across 41 European countries. This development marks a...

Cloudflare Introduces OpenPubkey SSH with Single Sign-On Integration

Cloudflare has contributed to the open-sourcing of OPKSSH, a tool that integrates single sign-on...

Mozilla Releases Urgent Patch for Windows After Chrome Zero-Day Exploit

Mozilla has released an urgent update for Firefox on Windows to address a critical...

Kuala Lumpur Airport Hit by Cyberattack, Hackers Demand $10M Ransom

Kuala Lumpur International Airport (KLIA), one of Southeast Asia's busiest airports, was hit by...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Meta AI Expands to 41 European Countries in New Rollout

Meta AI has announced its rollout across 41 European countries. This development marks a...

Cloudflare Introduces OpenPubkey SSH with Single Sign-On Integration

Cloudflare has contributed to the open-sourcing of OPKSSH, a tool that integrates single sign-on...

Mozilla Releases Urgent Patch for Windows After Chrome Zero-Day Exploit

Mozilla has released an urgent update for Firefox on Windows to address a critical...