Backdoor Attacks on Safe Reinforcement Learning-Enabled Cyber-Physical Systems

被引:0
|
作者
Jiang, Shixiong [1 ]
Liu, Mengyu [1 ]
Kong, Fanxin [1 ]
机构
[1] Univ Notre Dame, Dept Comp Sci & Engn, Notre Dame, IN 46556 USA
关键词
Training; Integrated circuits; Design automation; Navigation; Bridge circuits; Reinforcement learning; Safety; Backdoor attack; cyber-physical systems; safe reinforcement learning;
D O I
10.1109/TCAD.2024.3447468
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Safe reinforcement learning (RL) aims to derive a control policy that navigates a safety-critical system while avoiding unsafe explorations and adhering to safety constraints. While safe RL has been extensively studied, its vulnerabilities during the policy training have barely been explored in an adversarial setting. This article bridges this gap and investigates the training time vulnerability of formal language-guided safe RL. Such vulnerability allows a malicious adversary to inject backdoor behavior into the learned control policy. First, we formally define backdoor attacks for safe RL and divide them into active and passive ones depending on whether to manipulate the observation. Second, we propose two novel algorithms to synthesize the two kinds of attacks, respectively. Both algorithms generate backdoor behaviors that may go unnoticed after deployment but can be triggered when specific states are reached, leading to safety violations. Finally, we conduct both theoretical analysis and extensive experiments to show the effectiveness and stealthiness of our methods.
引用
收藏
页码:4093 / 4104
页数:12
相关论文
共 50 条
  • [41] Authentication of cyber-physical systems under learning-based attacks
    Khojasteh, Mohammad Javad
    Khina, Anatoly
    Franceschetti, Massimo
    Javidi, Tara
    IFAC PAPERSONLINE, 2019, 52 (20): : 369 - 374
  • [42] Interpretable Detection of Distribution Shifts in Learning Enabled Cyber-Physical Systems
    Yang, Yahan
    Kaur, Ramneet
    Dutta, Souradeep
    Lee, Insup
    2022 13TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS 2022), 2022, : 225 - 235
  • [43] Modeling and Simulation of Attacks on Cyber-physical Systems
    Bernardeschi, Cinzia
    Domenici, Andrea
    Palmieri, Maurizio
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 700 - 708
  • [44] Stealthy Deception Attacks for Cyber-Physical Systems
    Goes, Romulo Meira
    Kang, Eunsuk
    Kwong, Raymond
    Lafortune, Stephane
    2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [45] Cyber-physical attacks on power distribution systems
    Ayad, Abdelrahman
    Farag, Hany
    Youssef, Amr
    El-Saadany, Ehab
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2020, 5 (02) : 218 - 225
  • [46] A Survey of Network Attacks on Cyber-Physical Systems
    Cao, Liwei
    Jiang, Xiaoning
    Zhao, Yumei
    Wang, Shouguang
    You, Dan
    Xu, Xianli
    IEEE ACCESS, 2020, 8 : 44219 - 44227
  • [47] Covert Attacks in Cyber-Physical Control Systems
    de Sa, Alan Oliveira
    Rust da Costa Carmo, Luiz F.
    Machado, Raphael C. S.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (04) : 1641 - 1651
  • [48] Detection of Replay Attacks in Cyber-Physical Systems
    Hoehn, Andreas
    Zhang, Ping
    2016 AMERICAN CONTROL CONFERENCE (ACC), 2016, : 290 - 295
  • [49] A language for describing attacks on cyber-physical systems
    Yampolskiy, Mark
    Horvath, Peter
    Koutsoukos, Xenofon D.
    Xue, Yuan
    Sztipanovits, Janos
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2015, 8 : 40 - 52
  • [50] A Survey of Blockchain Enabled Cyber-Physical Systems
    Rathore, Heena
    Mohamed, Amr
    Guizani, Mohsen
    SENSORS, 2020, 20 (01)