Skip to main content

Showing 1–50 of 86 results for author: Poovendran, R

  1. arXiv:2406.12935  [pdf, other

    cs.CR cs.AI cs.LG

    ChatBug: A Common Vulnerability of Aligned LLMs Induced by Chat Templates

    Authors: Fengqing Jiang, Zhangchen Xu, Luyao Niu, Bill Yuchen Lin, Radha Poovendran

    Abstract: Large language models (LLMs) are expected to follow instructions from users and engage in conversations. Techniques to enhance LLMs' instruction-following capabilities typically fine-tune them using data structured according to a predefined chat template. Although chat templates are shown to be effective in optimizing LLM performance, their impact on safety alignment of LLMs has been less understo… ▽ More

    Submitted 16 June, 2024; originally announced June 2024.

  2. arXiv:2406.12257  [pdf, other

    cs.AI cs.CR

    CleanGen: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models

    Authors: Yuetai Li, Zhangchen Xu, Fengqing Jiang, Luyao Niu, Dinuka Sahabandu, Bhaskar Ramasubramanian, Radha Poovendran

    Abstract: The remarkable performance of large language models (LLMs) in generation tasks has enabled practitioners to leverage publicly available models to power custom applications, such as chatbots and virtual assistants. However, the data used to train or fine-tune these LLMs is often undisclosed, allowing an attacker to compromise the data and inject backdoors into the models. In this paper, we develop… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

  3. arXiv:2406.08464  [pdf, other

    cs.CL cs.AI

    Magpie: Alignment Data Synthesis from Scratch by Prompting Aligned LLMs with Nothing

    Authors: Zhangchen Xu, Fengqing Jiang, Luyao Niu, Yuntian Deng, Radha Poovendran, Yejin Choi, Bill Yuchen Lin

    Abstract: High-quality instruction data is critical for aligning large language models (LLMs). Although some models, such as Llama-3-Instruct, have open weights, their alignment data remain private, which hinders the democratization of AI. High human labor costs and a limited, predefined scope for prompting prevent existing open-source data creation methods from scaling effectively, potentially limiting the… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

    Comments: Link: https://magpie-align.github.io/

  4. arXiv:2405.20975  [pdf, other

    cs.CR cs.AI cs.LG

    ACE: A Model Poisoning Attack on Contribution Evaluation Methods in Federated Learning

    Authors: Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Bo Li, Radha Poovendran

    Abstract: In Federated Learning (FL), a set of clients collaboratively train a machine learning model (called global model) without sharing their local training data. The local training data of clients is typically non-i.i.d. and heterogeneous, resulting in varying contributions from individual clients to the final performance of the global model. In response, many contribution evaluation methods were propo… ▽ More

    Submitted 5 June, 2024; v1 submitted 31 May, 2024; originally announced May 2024.

    Comments: To appear in the 33rd USENIX Security Symposium, 2024

  5. arXiv:2402.18677  [pdf, other

    cs.RO cs.AI eess.SY

    Fault Tolerant Neural Control Barrier Functions for Robotic Systems under Sensor Faults and Attacks

    Authors: Hongchao Zhang, Luyao Niu, Andrew Clark, Radha Poovendran

    Abstract: Safety is a fundamental requirement of many robotic systems. Control barrier function (CBF)-based approaches have been proposed to guarantee the safety of robotic systems. However, the effectiveness of these approaches highly relies on the choice of CBFs. Inspired by the universal approximation power of neural networks, there is a growing trend toward representing CBFs using neural networks, leadi… ▽ More

    Submitted 28 February, 2024; originally announced February 2024.

  6. arXiv:2402.11753  [pdf, other

    cs.CL cs.AI

    ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs

    Authors: Fengqing Jiang, Zhangchen Xu, Luyao Niu, Zhen Xiang, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran

    Abstract: Safety is critical to the usage of large language models (LLMs). Multiple techniques such as data filtering and supervised fine-tuning have been developed to strengthen LLM safety. However, currently known techniques presume that corpora used for safety alignment of LLMs are solely interpreted by semantics. This assumption, however, does not hold in real-world applications, which leads to severe v… ▽ More

    Submitted 7 June, 2024; v1 submitted 18 February, 2024; originally announced February 2024.

    Comments: To appear in ACL 2024

  7. arXiv:2402.08983  [pdf, other

    cs.CR cs.AI cs.CL

    SafeDecoding: Defending against Jailbreak Attacks via Safety-Aware Decoding

    Authors: Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Bill Yuchen Lin, Radha Poovendran

    Abstract: As large language models (LLMs) become increasingly integrated into real-world applications such as code generation and chatbot assistance, extensive efforts have been made to align LLM behavior with human values, including safety. Jailbreak attacks, aiming to provoke unintended and unsafe behaviors from LLMs, remain a significant/leading LLM safety threat. In this paper, we aim to defend LLMs aga… ▽ More

    Submitted 7 June, 2024; v1 submitted 14 February, 2024; originally announced February 2024.

    Comments: To appear in ACL 2024

  8. arXiv:2402.08695  [pdf, other

    cs.CR cs.LG

    Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors

    Authors: Dinuka Sahabandu, Xiaojun Xu, Arezoo Rajabi, Luyao Niu, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran

    Abstract: We propose and analyze an adaptive adversary that can retrain a Trojaned DNN and is also aware of SOTA output-based Trojaned model detectors. We show that such an adversary can ensure (1) high accuracy on both trigger-embedded and clean samples and (2) bypass detection. Our approach is based on an observation that the high dimensionality of the DNN parameters provides sufficient degrees of freedom… ▽ More

    Submitted 12 February, 2024; originally announced February 2024.

  9. arXiv:2402.01114  [pdf, other

    cs.LG cs.AI cs.CR

    Double-Dip: Thwarting Label-Only Membership Inference Attacks with Transfer Learning and Randomization

    Authors: Arezoo Rajabi, Reeya Pimple, Aiswarya Janardhanan, Surudhi Asokraj, Bhaskar Ramasubramanian, Radha Poovendran

    Abstract: Transfer learning (TL) has been demonstrated to improve DNN model performance when faced with a scarcity of training samples. However, the suitability of TL as a solution to reduce vulnerability of overfitted DNNs to privacy attacks is unexplored. A class of privacy attacks called membership inference attacks (MIAs) aim to determine whether a given sample belongs to the training dataset (member) o… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

  10. arXiv:2401.12242  [pdf, other

    cs.CR cs.LG

    BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models

    Authors: Zhen Xiang, Fengqing Jiang, Zidi Xiong, Bhaskar Ramasubramanian, Radha Poovendran, Bo Li

    Abstract: Large language models (LLMs) are shown to benefit from chain-of-thought (COT) prompting, particularly when tackling tasks that require systematic reasoning processes. On the other hand, COT prompting also poses new vulnerabilities in the form of backdoor attacks, wherein the model will output unintended malicious content under specific backdoor-triggered conditions during inference. Traditional me… ▽ More

    Submitted 19 January, 2024; originally announced January 2024.

    Comments: Accepted to ICLR2024

  11. arXiv:2401.05562  [pdf, ps, other

    cs.LG cs.CR cs.DC

    Brave: Byzantine-Resilient and Privacy-Preserving Peer-to-Peer Federated Learning

    Authors: Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Radha Poovendran

    Abstract: Federated learning (FL) enables multiple participants to train a global machine learning model without sharing their private training data. Peer-to-peer (P2P) FL advances existing centralized FL paradigms by eliminating the server that aggregates local models from participants and then updates the global model. However, P2P FL is vulnerable to (i) honest-but-curious participants whose objective is… ▽ More

    Submitted 10 January, 2024; originally announced January 2024.

  12. arXiv:2311.16153  [pdf, other

    cs.CR cs.AI

    Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications

    Authors: Fengqing Jiang, Zhangchen Xu, Luyao Niu, Boxin Wang, Jinyuan Jia, Bo Li, Radha Poovendran

    Abstract: Large language models (LLMs) are increasingly deployed as the service backend for LLM-integrated applications such as code completion and AI-powered search. LLM-integrated applications serve as middleware to refine users' queries with domain-specific knowledge to better inform LLMs and enhance the responses. Despite numerous opportunities and benefits, LLM-integrated applications also introduce ne… ▽ More

    Submitted 28 November, 2023; v1 submitted 7 November, 2023; originally announced November 2023.

  13. arXiv:2308.15673  [pdf, other

    cs.CR cs.LG

    MDTD: A Multi Domain Trojan Detector for Deep Neural Networks

    Authors: Arezoo Rajabi, Surudhi Asokraj, Fengqing Jiang, Luyao Niu, Bhaskar Ramasubramanian, Jim Ritcey, Radha Poovendran

    Abstract: Machine learning models that use deep neural networks (DNNs) are vulnerable to backdoor attacks. An adversary carrying out a backdoor attack embeds a predefined perturbation called a trigger into a small subset of input samples and trains the DNN such that the presence of the trigger in the input results in an adversary-desired output class. Such adversarial retraining however needs to ensure that… ▽ More

    Submitted 2 September, 2023; v1 submitted 29 August, 2023; originally announced August 2023.

    Comments: Accepted to ACM Conference on Computer and Communications Security (ACM CCS) 2023

  14. arXiv:2304.02058  [pdf, ps, other

    eess.SY

    A Compositional Resilience Index for Computationally Efficient Safety Analysis of Interconnected Systems

    Authors: Luyao Niu, Abdullah Al Maruf, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran

    Abstract: Interconnected systems such as power systems and chemical processes are often required to satisfy safety properties in the presence of faults and attacks. Verifying safety of these systems, however, is computationally challenging due to nonlinear dynamics, high dimensionality, and combinatorial number of possible faults and attacks that can be incurred by the subsystems interconnected within the n… ▽ More

    Submitted 4 April, 2023; originally announced April 2023.

  15. arXiv:2304.02005  [pdf, other

    cs.AI cs.MA eess.SY

    Risk-Aware Distributed Multi-Agent Reinforcement Learning

    Authors: Abdullah Al Maruf, Luyao Niu, Bhaskar Ramasubramanian, Andrew Clark, Radha Poovendran

    Abstract: Autonomous cyber and cyber-physical systems need to perform decision-making, learning, and control in unknown environments. Such decision-making can be sensitive to multiple factors, including modeling errors, changes in costs, and impacts of events in the tails of probability distributions. Although multi-agent reinforcement learning (MARL) provides a framework for learning behaviors through repe… ▽ More

    Submitted 4 April, 2023; originally announced April 2023.

  16. arXiv:2302.10308  [pdf, other

    math.OC eess.SP eess.SY

    A Hybrid Submodular Optimization Approach to Controlled Islanding with Post-Disturbance Stability Guarantees

    Authors: Luyao Niu, Dinuka Sahanbandu, Andrew Clark, Radha Poovendran

    Abstract: Disturbances may create cascading failures in power systems and lead to widespread blackouts. Controlled islanding is an effective approach to mitigate cascading failures by partitioning the power system into a set of disjoint islands. To retain the stability of the power system following disturbances, the islanding strategy should not only be minimally disruptive, but also guarantee post-disturba… ▽ More

    Submitted 9 August, 2023; v1 submitted 17 February, 2023; originally announced February 2023.

  17. arXiv:2301.04587  [pdf, other

    cs.CR

    Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs

    Authors: Alessandro Brighente, Mauro Conti, Denis Donadel, Radha Poovendran, Federico Turrin, Jianying Zhou

    Abstract: Electric Vehicles (EVs) share common technologies with classical fossil-fueled cars, but they also employ novel technologies and components (e.g., Charging System and Battery Management System) that create an unexplored attack surface for malicious users. Although multiple contributions in the literature explored cybersecurity aspects of particular components of the EV ecosystem (e.g., charging in… ▽ More

    Submitted 11 January, 2023; originally announced January 2023.

  18. arXiv:2212.01688  [pdf, other

    cs.LG cs.CR

    LDL: A Defense for Label-Based Membership Inference Attacks

    Authors: Arezoo Rajabi, Dinuka Sahabandu, Luyao Niu, Bhaskar Ramasubramanian, Radha Poovendran

    Abstract: The data used to train deep neural network (DNN) models in applications such as healthcare and finance typically contain sensitive information. A DNN model may suffer from overfitting. Overfitted models have been shown to be susceptible to query-based attacks such as membership inference attacks (MIAs). MIAs aim to determine whether a sample belongs to the dataset used to train a classifier (membe… ▽ More

    Submitted 16 December, 2022; v1 submitted 3 December, 2022; originally announced December 2022.

    Comments: to appear in ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2023)

  19. arXiv:2208.14282  [pdf, ps, other

    eess.SY

    A Timing-Based Framework for Designing Resilient Cyber-Physical Systems under Safety Constraint

    Authors: Abdullah Al Maruf, Luyao Niu, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran

    Abstract: Cyber-physical systems (CPS) are required to satisfy safety constraints in various application domains such as robotics, industrial manufacturing systems, and power systems. Faults and cyber attacks have been shown to cause safety violations, which can damage the system and endanger human lives. Resilient architectures have been proposed to ensure safety of CPS under such faults and attacks via me… ▽ More

    Submitted 1 September, 2022; v1 submitted 30 August, 2022; originally announced August 2022.

  20. arXiv:2208.02857  [pdf, other

    cs.CR

    Identity-Based Authentication for On-Demand Charging of Electric Vehicles

    Authors: Surudhi Asokraj, Tommaso Bianchi, Alessandro Brighente, Mauro Conti, Radha Poovendran

    Abstract: Dynamic wireless power transfer provides means for charging Electric Vehicles (EVs) while driving, avoiding stopping for charging and hence fostering their widespread adoption. Researchers devoted much effort over the last decade to provide a reliable infrastructure for potential users to improve comfort and time management. Due to the severe security and performance system requirements, the diffe… ▽ More

    Submitted 4 August, 2022; originally announced August 2022.

    Comments: 13 pages

  21. arXiv:2207.05937  [pdf, other

    cs.LG cs.CR cs.GT

    Game of Trojans: A Submodular Byzantine Approach

    Authors: Dinuka Sahabandu, Arezoo Rajabi, Luyao Niu, Bo Li, Bhaskar Ramasubramanian, Radha Poovendran

    Abstract: Machine learning models in the wild have been shown to be vulnerable to Trojan attacks during training. Although many detection mechanisms have been proposed, strong adaptive attackers have been shown to be effective against them. In this paper, we aim to answer the questions considering an intelligent and adaptive adversary: (i) What is the minimal amount of instances required to be Trojaned by a… ▽ More

    Submitted 12 July, 2022; originally announced July 2022.

    Comments: Submitted to GameSec 2022

  22. QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer

    Authors: Tommaso Bianchi, Surudhi Asokraj, Alessandro Brighente, Mauro Conti, Radha Poovendran

    Abstract: Dynamic Wireless Power Transfer (DWPT) can be used for on-demand recharging of Electric Vehicles (EV) while driving. However, DWPT raises numerous security and privacy concerns. Recently, researchers demonstrated that DWPT systems are vulnerable to adversarial attacks. In an EV charging scenario, an attacker can prevent the authorized customer from charging, obtain a free charge by billing a victi… ▽ More

    Submitted 28 August, 2023; v1 submitted 20 May, 2022; originally announced May 2022.

    Comments: 6 pages, conference

    Journal ref: 2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring), Florence, Italy, 2023, pp. 1-6

  23. arXiv:2204.06624  [pdf, other

    cs.CR cs.LG

    A Natural Language Processing Approach for Instruction Set Architecture Identification

    Authors: Dinuka Sahabandu, Sukarno Mertoguno, Radha Poovendran

    Abstract: Binary analysis of software is a critical step in cyber forensics applications such as program vulnerability assessment and malware detection. This involves interpreting instructions executed by software and often necessitates converting the software's binary file data to assembly language. The conversion process requires information about the binary file's target instruction set architecture (ISA… ▽ More

    Submitted 13 April, 2022; originally announced April 2022.

    Comments: 13 pages, 9 figures, submitted to IEEE TIFS

  24. arXiv:2204.00514  [pdf, other

    eess.SY

    An Analytical Framework for Control Synthesis of Cyber-Physical Systems with Safety Guarantee

    Authors: Luyao Niu, Abdullah Al Maruf, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran

    Abstract: Cyber-physical systems (CPS) are required to operate safely under fault and malicious attacks. The simplex architecture and the recently proposed cyber resilient architectures, e.g., Byzantine fault tolerant++ (BFT++), provide safety for CPS under faults and malicious cyber attacks, respectively. However, these existing architectures make use of different timing parameters and implementations to p… ▽ More

    Submitted 1 April, 2022; originally announced April 2022.

  25. arXiv:2204.00512  [pdf, ps, other

    eess.SY

    A Compositional Approach to Safety-Critical Resilient Control for Systems with Coupled Dynamics

    Authors: Abdullah Al Maruf, Luyao Niu, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran

    Abstract: Complex, interconnected Cyber-physical Systems (CPS) are increasingly common in applications including smart grids and transportation. Ensuring safety of interconnected systems whose dynamics are coupled is challenging because the effects of faults and attacks in one sub-system can propagate to other sub-systems and lead to safety violations. In this paper, we study the problem of safety-critical… ▽ More

    Submitted 1 April, 2022; originally announced April 2022.

  26. arXiv:2203.15506  [pdf, other

    cs.CR cs.AI cs.LG

    Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning

    Authors: Arezoo Rajabi, Bhaskar Ramasubramanian, Radha Poovendran

    Abstract: Machine learning (ML) models that use deep neural networks are vulnerable to backdoor attacks. Such attacks involve the insertion of a (hidden) trigger by an adversary. As a consequence, any input that contains the trigger will cause the neural network to misclassify the input to a (single) target class, while classifying other inputs without a trigger correctly. ML models that contain a backdoor… ▽ More

    Submitted 24 March, 2022; originally announced March 2022.

    Comments: Submitted to conference

  27. arXiv:2203.10165  [pdf, other

    cs.LG cs.AI cs.CR eess.SY

    Privacy-Preserving Reinforcement Learning Beyond Expectation

    Authors: Arezoo Rajabi, Bhaskar Ramasubramanian, Abdullah Al Maruf, Radha Poovendran

    Abstract: Cyber and cyber-physical systems equipped with machine learning algorithms such as autonomous cars share environments with humans. In such a setting, it is important to align system (or agent) behaviors with the preferences of one or more human users. We consider the case when an agent has to learn behaviors in an unknown environment. Our goal is to capture two defining characteristics of humans:… ▽ More

    Submitted 18 March, 2022; originally announced March 2022.

    Comments: Submitted to conference. arXiv admin note: text overlap with arXiv:2104.00540

  28. arXiv:2203.05266  [pdf, other

    cs.CR

    EVExchange: A Relay Attack on Electric Vehicle Charging System

    Authors: Mauro Conti, Denis Donadel, Radha Poovendran, Federico Turrin

    Abstract: To support the increasing spread of Electric Vehicles (EVs), Charging Stations (CSs) are being installed worldwide. The new generation of CSs employs the Vehicle-To-Grid (V2G) paradigm by implementing novel standards such as the ISO 15118. This standard enables high-level communication between the vehicle and the charging column, helps manage the charge smartly, and simplifies the payment phase. T… ▽ More

    Submitted 7 July, 2022; v1 submitted 10 March, 2022; originally announced March 2022.

    Comments: 20 pages, 6 figures

  29. arXiv:2202.09489  [pdf, other

    cs.MA cs.AI cs.LG

    Shaping Advice in Deep Reinforcement Learning

    Authors: Baicen Xiao, Bhaskar Ramasubramanian, Radha Poovendran

    Abstract: Reinforcement learning involves agents interacting with an environment to complete tasks. When rewards provided by the environment are sparse, agents may not receive immediate feedback on the quality of actions that they take, thereby affecting learning of policies. In this paper, we propose to methods to augment the reward signal from the environment with an additional reward termed shaping advic… ▽ More

    Submitted 18 February, 2022; originally announced February 2022.

    Comments: Submitted to journal special issue. arXiv admin note: substantial text overlap with arXiv:2103.15941, arXiv:1907.08823

  30. arXiv:2201.04612  [pdf, other

    cs.MA cs.AI cs.LG

    Agent-Temporal Attention for Reward Redistribution in Episodic Multi-Agent Reinforcement Learning

    Authors: Baicen Xiao, Bhaskar Ramasubramanian, Radha Poovendran

    Abstract: This paper considers multi-agent reinforcement learning (MARL) tasks where agents receive a shared global reward at the end of an episode. The delayed nature of this reward affects the ability of the agents to assess the quality of their actions at intermediate time-steps. This paper focuses on developing methods to learn a temporal redistribution of the episodic reward to obtain a dense reward si… ▽ More

    Submitted 12 January, 2022; originally announced January 2022.

    Comments: Extended version of paper accepted for Oral Presentation at the International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS), 2022

  31. arXiv:2108.01628  [pdf, other

    eess.SY

    A Game-Theoretic Framework for Controlled Islanding in the Presence of Adversaries

    Authors: Luyao Niu, Dinuka Sahabandu, Andrew Clark, Radha Poovendran

    Abstract: Controlled islanding effectively mitigates cascading failures by partitioning the power system into a set of disjoint islands. In this paper, we study the controlled islanding problem of a power system under disturbances introduced by a malicious adversary. We formulate the interaction between the grid operator and adversary using a game-theoretic framework. The grid operator first computes a cont… ▽ More

    Submitted 27 September, 2021; v1 submitted 3 August, 2021; originally announced August 2021.

  32. arXiv:2104.00540  [pdf, other

    cs.LG cs.AI eess.SY math.OC

    Reinforcement Learning Beyond Expectation

    Authors: Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Radha Poovendran

    Abstract: The inputs and preferences of human users are important considerations in situations where these users interact with autonomous cyber or cyber-physical systems. In these scenarios, one is often interested in aligning behaviors of the system with the preferences of one or more human users. Cumulative prospect theory (CPT) is a paradigm that has been empirically shown to model a tendency of humans t… ▽ More

    Submitted 29 March, 2021; originally announced April 2021.

  33. arXiv:2103.15941  [pdf, other

    cs.LG cs.AI eess.SY

    Shaping Advice in Deep Multi-Agent Reinforcement Learning

    Authors: Baicen Xiao, Bhaskar Ramasubramanian, Radha Poovendran

    Abstract: Multi-agent reinforcement learning involves multiple agents interacting with each other and a shared environment to complete tasks. When rewards provided by the environment are sparse, agents may not receive immediate feedback on the quality of actions that they take, thereby affecting learning of policies. In this paper, we propose a method called Shaping Advice in deep Multi-agent reinforcement… ▽ More

    Submitted 29 March, 2021; originally announced March 2021.

  34. arXiv:2103.15894  [pdf, ps, other

    cs.MA

    Scalable Planning in Multi-Agent MDPs

    Authors: Dinuka Sahabandu, Luyao Niu, Andrew Clark, Radha Poovendran

    Abstract: Multi-agent Markov Decision Processes (MMDPs) arise in a variety of applications including target tracking, control of multi-robot swarms, and multiplayer games. A key challenge in MMDPs occurs when the state and action spaces grow exponentially in the number of agents, making computation of an optimal policy computationally intractable for medium- to large-scale problems. One property that has be… ▽ More

    Submitted 29 March, 2021; originally announced March 2021.

  35. arXiv:2101.03253  [pdf, other

    cs.GT eess.SY math.OC

    Adaptive Learning in Two-Player Stackelberg Games with Application to Network Security

    Authors: Guosong Yang, Radha Poovendran, João P. Hespanha

    Abstract: We study a two-player Stackelberg game with incomplete information such that the follower's strategy belongs to a known family of parameterized functions with an unknown parameter vector. We design an adaptive learning approach to simultaneously estimate the unknown parameter and minimize the leader's cost, based on adaptive control techniques and hysteresis switching. Our approach guarantees that… ▽ More

    Submitted 8 January, 2021; originally announced January 2021.

    MSC Class: 91A26; 91A65 (Primary) 37N40; 93C40; 65L20 (Secondary)

  36. arXiv:2009.09511  [pdf, other

    eess.SY cs.CR cs.LG math.OC

    Safety-Critical Online Control with Adversarial Disturbances

    Authors: Bhaskar Ramasubramanian, Baicen Xiao, Linda Bushnell, Radha Poovendran

    Abstract: This paper studies the control of safety-critical dynamical systems in the presence of adversarial disturbances. We seek to synthesize state-feedback controllers to minimize a cost incurred due to the disturbance, while respecting a safety constraint. The safety constraint is given by a bound on an H-inf norm, while the cost is specified as an upper bound on the H-2 norm of the system. We consider… ▽ More

    Submitted 20 September, 2020; originally announced September 2020.

    Comments: Paper accepted to the Conference on Decision and Control (CDC), 2020

  37. arXiv:2007.13272  [pdf, other

    eess.SY cs.CR cs.LO math.OC

    Privacy-Preserving Resilience of Cyber-Physical Systems to Adversaries

    Authors: Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: A cyber-physical system (CPS) is expected to be resilient to more than one type of adversary. In this paper, we consider a CPS that has to satisfy a linear temporal logic (LTL) objective in the presence of two kinds of adversaries. The first adversary has the ability to tamper with inputs to the CPS to influence satisfaction of the LTL objective. The interaction of the CPS with this adversary is m… ▽ More

    Submitted 26 July, 2020; originally announced July 2020.

    Comments: Accepted to the IEEE Conference on Decision and Control (CDC), 2020

  38. arXiv:2007.12501  [pdf, other

    eess.SY cs.CR cs.GT cs.LO

    Secure Control in Partially Observable Environments to Satisfy LTL Specifications

    Authors: Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: This paper studies the synthesis of control policies for an agent that has to satisfy a temporal logic specification in a partially observable environment, in the presence of an adversary. The interaction of the agent (defender) with the adversary is modeled as a partially observable stochastic game. The goal is to generate a defender policy to maximize satisfaction of a given temporal logic speci… ▽ More

    Submitted 4 November, 2020; v1 submitted 22 July, 2020; originally announced July 2020.

    Comments: Provisionally accepted to the IEEE Transactions on Automatic Control. arXiv admin note: text overlap with arXiv:1903.06873

  39. arXiv:2007.12327  [pdf, other

    cs.GT cs.CR

    Stochastic Dynamic Information Flow Tracking Game using Supervised Learning for Detecting Advanced Persistent Threats

    Authors: Shana Moothedath, Dinuka Sahabandu, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran

    Abstract: Advanced persistent threats (APTs) are organized prolonged cyberattacks by sophisticated attackers. Although APT activities are stealthy, they interact with the system components and these interactions lead to information flows. Dynamic Information Flow Tracking (DIFT) has been proposed as one of the effective ways to detect APTs using the information flows. However, wide range security analysis u… ▽ More

    Submitted 25 June, 2021; v1 submitted 23 July, 2020; originally announced July 2020.

  40. arXiv:2007.00076  [pdf, other

    math.OC cs.GT

    A Reinforcement Learning Approach for Dynamic Information Flow Tracking Games for Detecting Advanced Persistent Threats

    Authors: Dinuka Sahabandu, Shana Moothedath, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran

    Abstract: Advanced Persistent Threats (APTs) are stealthy attacks that threaten the security and privacy of sensitive information. Interactions of APTs with victim system introduce information flows that are recorded in the system logs. Dynamic Information Flow Tracking (DIFT) is a promising detection mechanism for detecting APTs. DIFT taints information flows originating at system entities that are suscept… ▽ More

    Submitted 28 June, 2021; v1 submitted 30 June, 2020; originally announced July 2020.

    Comments: 15

  41. arXiv:2006.12327  [pdf, other

    cs.GT

    Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach

    Authors: Shana Moothedath, Dinuka Sahabandu, Joey Allen, Andrew Clark, Linda Bushnell, Wenke Lee, Radha Poovendran

    Abstract: Advanced Persistent Threats (APTs) are stealthy customized attacks by intelligent adversaries. This paper deals with the detection of APTs that infiltrate cyber systems and compromise specifically targeted data and/or infrastructures. Dynamic information flow tracking is an information trace-based detection mechanism against APTs that taints suspicious information flows in the system and generates… ▽ More

    Submitted 25 June, 2021; v1 submitted 22 June, 2020; originally announced June 2020.

  42. arXiv:2003.12733  [pdf, other

    eess.SY

    Submodular Input Selection for Synchronization in Kuramoto Networks

    Authors: Dinuka Sahabandu, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: Synchronization is an essential property of engineered and natural networked dynamical systems. The Kuramoto model of nonlinear synchronization has been widely studied in applications including entrainment of clock cells in brain networks and power system stability. Synchronization of Kuramoto networks has been found to be challenging in the presence of signed couplings between oscillators and whe… ▽ More

    Submitted 31 March, 2020; v1 submitted 28 March, 2020; originally announced March 2020.

    Comments: 9 pages, 3 figures

  43. Control Synthesis for Cyber-Physical Systems to Satisfy Metric Interval Temporal Logic Objectives under Timing and Actuator Attacks

    Authors: Luyao Niu, Bhaskar Ramasubramanian, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: This paper studies the synthesis of controllers for cyber-physical systems (CPSs) that are required to carry out complex tasks that are time-sensitive, in the presence of an adversary. The task is specified as a formula in metric interval temporal logic (MITL). The adversary is assumed to have the ability to tamper with the control input to the CPS and also manipulate timing information perceived… ▽ More

    Submitted 27 January, 2020; originally announced January 2020.

    Journal ref: 2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS), Sydney, Australia, 2020, pp. 162-173

  44. arXiv:2001.06781  [pdf, other

    cs.AI

    FRESH: Interactive Reward Shaping in High-Dimensional State Spaces using Human Feedback

    Authors: Baicen Xiao, Qifan Lu, Bhaskar Ramasubramanian, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: Reinforcement learning has been successful in training autonomous agents to accomplish goals in complex environments. Although this has been adapted to multiple settings, including robotics and computer games, human players often find it easier to obtain higher rewards in some environments than reinforcement learning algorithms. This is especially true of high-dimensional state spaces where the re… ▽ More

    Submitted 19 January, 2020; originally announced January 2020.

    Comments: Accepted as Full Paper to International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS) 2020

  45. arXiv:1912.04735  [pdf, other

    cs.CR

    Covert Channel-Based Transmitter Authentication in Controller Area Networks

    Authors: Xuhang Ying, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran

    Abstract: In recent years, the security of automotive Cyber-Physical Systems (CPSs) is facing urgent threats due to the widespread use of legacy in-vehicle communication systems. As a representative legacy bus system, the Controller Area Network (CAN) hosts Electronic Control Units (ECUs) that are crucial vehicle functioning. In this scenario, malicious actors can exploit CAN vulnerabilities, such as the la… ▽ More

    Submitted 7 December, 2019; originally announced December 2019.

    Comments: Submitted to TDSC (Transactions on Dependable and Secure Computing). arXiv admin note: text overlap with arXiv:1903.05231

  46. arXiv:1910.12282  [pdf, other

    eess.SY cs.GT cs.LO

    Linear Temporal Logic Satisfaction in Adversarial Environments using Secure Control Barrier Certificates

    Authors: Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell, Radha Poovendran

    Abstract: This paper studies the satisfaction of a class of temporal properties for cyber-physical systems (CPSs) over a finite-time horizon in the presence of an adversary, in an environment described by discrete-time dynamics. The temporal logic specification is given in safe-LTL_F, a fragment of linear temporal logic over traces of finite length. The interaction of the CPS with the adversary is modeled a… ▽ More

    Submitted 27 October, 2019; originally announced October 2019.

    Comments: Proc. of GameSec2019 (to appear). This version corrects a typo in the simulation, and clarifies some ambiguous material from the Proceedings version

  47. arXiv:1907.12138  [pdf, other

    cs.LG cs.CR stat.ML

    Are Odds Really Odd? Bypassing Statistical Detection of Adversarial Examples

    Authors: Hossein Hosseini, Sreeram Kannan, Radha Poovendran

    Abstract: Deep learning classifiers are known to be vulnerable to adversarial examples. A recent paper presented at ICML 2019 proposed a statistical test detection method based on the observation that logits of noisy adversarial examples are biased toward the true class. The method is evaluated on CIFAR-10 dataset and is shown to achieve 99% true positive rate (TPR) at only 1% false positive rate (FPR). In… ▽ More

    Submitted 28 July, 2019; originally announced July 2019.

  48. arXiv:1907.10783  [pdf, other

    cs.CR

    Mitigating Vulnerabilities of Voltage-based Intrusion Detection Systems in Controller Area Networks

    Authors: Sang Uk Sagong, Radha Poovendran, Linda Bushnell

    Abstract: Data for controlling a vehicle is exchanged among Electronic Control Units (ECUs) via in-vehicle network protocols such as the Controller Area Network (CAN) protocol. Since these protocols are designed for an isolated network, the protocols do not encrypt data nor authenticate messages. Intrusion Detection Systems (IDSs) are developed to secure the CAN protocol by detecting abnormal deviations in… ▽ More

    Submitted 24 July, 2019; originally announced July 2019.

    Comments: 11 pages, 24 figures

    MSC Class: 68W01

  49. arXiv:1907.08823  [pdf, other

    cs.LG cs.AI eess.SY stat.ML

    Potential-Based Advice for Stochastic Policy Learning

    Authors: Baicen Xiao, Bhaskar Ramasubramanian, Andrew Clark, Hannaneh Hajishirzi, Linda Bushnell, Radha Poovendran

    Abstract: This paper augments the reward received by a reinforcement learning agent with potential functions in order to help the agent learn (possibly stochastic) optimal policies. We show that a potential-based reward shaping scheme is able to preserve optimality of stochastic policies, and demonstrate that the ability of an agent to learn an optimal policy is not affected when this scheme is augmented to… ▽ More

    Submitted 20 July, 2019; originally announced July 2019.

    Comments: Accepted to the IEEE Conference on Decision and Control, 2019

  50. arXiv:1905.00180  [pdf, other

    cs.LG stat.ML

    Dropping Pixels for Adversarial Robustness

    Authors: Hossein Hosseini, Sreeram Kannan, Radha Poovendran

    Abstract: Deep neural networks are vulnerable against adversarial examples. In this paper, we propose to train and test the networks with randomly subsampled images with high drop rates. We show that this approach significantly improves robustness against adversarial examples in all cases of bounded L0, L2 and L_inf perturbations, while reducing the standard accuracy by a small value. We argue that subsampl… ▽ More

    Submitted 1 May, 2019; originally announced May 2019.