Backdoor Attacks on Safe Reinforcement Learning-Enabled Cyber-Physical Systems

被引:0
|
作者
Jiang, Shixiong [1 ]
Liu, Mengyu [1 ]
Kong, Fanxin [1 ]
机构
[1] Univ Notre Dame, Dept Comp Sci & Engn, Notre Dame, IN 46556 USA
关键词
Training; Integrated circuits; Design automation; Navigation; Bridge circuits; Reinforcement learning; Safety; Backdoor attack; cyber-physical systems; safe reinforcement learning;
D O I
10.1109/TCAD.2024.3447468
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Safe reinforcement learning (RL) aims to derive a control policy that navigates a safety-critical system while avoiding unsafe explorations and adhering to safety constraints. While safe RL has been extensively studied, its vulnerabilities during the policy training have barely been explored in an adversarial setting. This article bridges this gap and investigates the training time vulnerability of formal language-guided safe RL. Such vulnerability allows a malicious adversary to inject backdoor behavior into the learned control policy. First, we formally define backdoor attacks for safe RL and divide them into active and passive ones depending on whether to manipulate the observation. Second, we propose two novel algorithms to synthesize the two kinds of attacks, respectively. Both algorithms generate backdoor behaviors that may go unnoticed after deployment but can be triggered when specific states are reached, leading to safety violations. Finally, we conduct both theoretical analysis and extensive experiments to show the effectiveness and stealthiness of our methods.
引用
收藏
页码:4093 / 4104
页数:12
相关论文
共 50 条
  • [21] Demo: Vulnerability Analysis for STL-Guided Safe Reinforcement Learning in Cyber-Physical Systems
    Jiang, Shixiong
    Liu, Mengyu
    Kong, Fanxin
    2024 IEEE 30TH REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM, RTAS 2024, 2023, : 400 - 401
  • [22] Integrity Attacks on Cyber-Physical Systems
    Mo, Yilin
    Sinopoli, Bruno
    HICONS 12: PROCEEDINGS OF THE 1ST ACM INTERNATIONAL CONFERENCE ON HIGH CONFIDENCE NETWORKED SYSTEMS, 2012, : 47 - 54
  • [23] Cryptanalytical Attacks on Cyber-physical Systems
    Novotny, Martin
    2016 5TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2016, : 10 - 10
  • [24] Cryptanalytic attacks on cyber-physical systems
    Novotny, Martin
    MICROPROCESSORS AND MICROSYSTEMS, 2017, 52 : 534 - 539
  • [25] Trusted Confidence Bounds for Learning Enabled Cyber-Physical Systems
    Boursinos, Dimitrios
    Koutsoukos, Xenofon
    2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2020), 2020, : 228 - 233
  • [26] Toward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber-Physical Systems
    Jahromi, Amir Namavar
    Karimipour, Hadis
    Dehghantanha, Ali
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (17) : 13712 - 13722
  • [27] Security Analysis of Cyber-Physical Systems Using Reinforcement Learning
    Ibrahim, Mariam
    Elhafiz, Ruba
    SENSORS, 2023, 23 (03)
  • [28] Deep Reinforcement Learning for Mitigating Cyber-Physical DER Voltage Unbalance Attacks
    Roberts, Ciaran
    Ngo, Sy-Toan
    Milesi, Alexandre
    Scaglione, Anna
    Peisert, Sean
    Arnold, Daniel
    2021 AMERICAN CONTROL CONFERENCE (ACC), 2021, : 2861 - 2867
  • [29] Safety Verification of Cyber-Physical Systems with Reinforcement Learning Control
    Hoang-Dung Tran
    Cai, Feiyang
    Diego, Manzanas Lopez
    Musau, Patrick
    Johnson, Taylor T.
    Koutsoukos, Xenofon
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2019, 18 (05)
  • [30] Robust Testing for Cyber-Physical Systems using Reinforcement Learning
    Qin, Xin
    Arechiga, Nikos
    Deshmukh, Jyotirmoy
    Best, Andrew
    2023 21ST ACM-IEEE INTERNATIONAL SYMPOSIUM ON FORMAL METHODS AND MODELS FOR SYSTEM DESIGN, MEMOCODE, 2023, : 36 - 46