Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
Home/CyberSecurity News/Linux ELF Malware Evades ML Detection via Semantic
CyberSecurity News

Linux ELF Malware Evades ML Detection via Semantic

Researchers at the Czech Technical University in Prague have unveiled a new adversarial malware generator designed for Linux ELF binaries. It achieves a 67.74% evasion rate against ML-based malware...

Emy Elsamnoudy
Emy Elsamnoudy
April 28, 2026 2 Min Read
0 0

Researchers at the Czech Technical University in Prague have unveiled a new adversarial malware generator designed for Linux ELF binaries.

It achieves a 67.74% evasion rate against ML-based malware detectors while keeping the payload fully functional.

Published on arXiv on April 24, 2026, the study by Lukáš Hrdonka and Martin Jurecek exposes a critical blind spot in modern ML-based security tools.

Adversarial attacks have been widely studied for Windows PE files, but Linux ELF binaries remain relatively underexplored.

This gap is increasingly risky as Linux powers cloud infrastructure, IoT devices, and high-performance computing systems.

The Czech Technical University in Prague researchers built their generator around a genetic algorithm workflow that applies 12 distinct modification types across 7 different data sources, maximizing the diversity of generated adversarial samples.

The target classifier chosen was MalConv, a well-known deep learning model used in malware detection pipelines.

Linux ELF Malware Generator

The core principle behind the generator is semantic preservation, modifying a binary’s static structure without altering how it actually executes.

This is a strict requirement: any change that breaks the malware’s functionality defeats the purpose of the attack.

The most effective technique identified involved injecting strings typical of legitimate, benign files into the malicious binary.

Researchers from the Czech Technical University in Prague found that MalConv is sensitive to these strings regardless of where they appear within the executable file at the beginning, middle, or end.

This means attackers do not need precise knowledge of the internal file structure to manipulate the classifier’s output.

Beyond the standard Evasion Rate (ER) metric, the team introduced two new evaluation metrics, the Extended Evasion Rate (EER) and a confidence-shift measurement, to better capture the extent to which the generator degrades a detector’s certainty.

In the mean case, the generator reduced MalConv’s malware classification confidence by −0.50, a substantial drop that highlights how far ML models can be pushed toward misclassification.

Why This Matters for Defenders

Research published on arXiv by the Czech Technical University in Prague highlights a growing arms race between adversarial malware authors and ML-based defense systems.

Prior work on ELF binaries, such as the ADVeRL-ELF framework using reinforcement learning, achieved a 59.5% evasion success rate against IoT-focused ARM architecture binaries.

The new generator pushes that ceiling higher and demonstrates that Linux endpoints, containers, and cloud workloads are increasingly viable targets for adversarial evasion attacks.

Security teams relying solely on ML-based detection in Linux environments should treat research from the Czech Technical University in Prague as a strong signal to adopt layered defenses.

Combining behavioral analysis, signature-based detection, and adversarial retraining with modified binaries can significantly reduce evasion success rates.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareSecurity

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

OpenClaw Vulnerabilities Allow Policy Bypass & Host Override

Next Post

PyPI Package Hacked: Malicious Script Popular With

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
China-Aligned Attackers Use ShadowPad, IOX Proxy WMIC Multi-Stage
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us