Adversarial Exploitation of Policy Imitation

06/03/2019
by   Vahid Behzadan, et al.
0

This paper investigates a class of attacks targeting the confidentiality aspect of security in Deep Reinforcement Learning (DRL) policies. Recent research have established the vulnerability of supervised machine learning models (e.g., classifiers) to model extraction attacks. Such attacks leverage the loosely-restricted ability of the attacker to iteratively query the model for labels, thereby allowing for the forging of a labeled dataset which can be used to train a replica of the original model. In this work, we demonstrate the feasibility of exploiting imitation learning techniques in launching model extraction attacks on DRL agents. Furthermore, we develop proof-of-concept attacks that leverage such techniques for black-box attacks against the integrity of DRL policies. We also present a discussion on potential solution concepts for mitigation techniques.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/09/2020

Stealing Deep Reinforcement Learning Models for Fun and Profit

In this paper, we present the first attack methodology to extract black-...
research
09/29/2021

Mitigation of Adversarial Policy Imitation via Constrained Randomization of Policy (CRoP)

Deep reinforcement learning (DRL) policies are vulnerable to unauthorize...
research
10/22/2020

Adversarial Attacks on Deep Algorithmic Trading Policies

Deep Reinforcement Learning (DRL) has become an appealing solution to al...
research
07/12/2020

Adversarial jamming attacks and defense strategies via adaptive deep reinforcement learning

As the applications of deep reinforcement learning (DRL) in wireless com...
research
07/21/2019

Characterizing Attacks on Deep Reinforcement Learning

Deep reinforcement learning (DRL) has achieved great success in various ...
research
11/13/2020

Query-based Targeted Action-Space Adversarial Policies on Deep Reinforcement Learning Agents

Advances in computing resources have resulted in the increasing complexi...
research
09/08/2022

Reward Delay Attacks on Deep Reinforcement Learning

Most reinforcement learning algorithms implicitly assume strong synchron...

Please sign up or login with your details

Forgot password? Click here to reset