all InfoSec news
Stealthy Imitation: Reward-guided Environment-free Policy Stealing
May 14, 2024, 4:11 a.m. | Zhixiong Zhuang, Maria-Irina Nicolae, Mario Fritz
cs.CR updates on arXiv.org arxiv.org
Abstract: Deep reinforcement learning policies, which are integral to modern control systems, represent valuable intellectual property. The development of these policies demands considerable resources, such as domain expertise, simulation fidelity, and real-world validation. These policies are potentially vulnerable to model stealing attacks, which aim to replicate their functionality using only black-box access. In this paper, we propose Stealthy Imitation, the first attack designed to steal policies without access to the environment or knowledge of the input …
aim arxiv attacks control control systems cs.cr cs.lg demands development domain environment expertise fidelity free intellectual property policies policy property real resources reward simulation stealing systems validation vulnerable world
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Corporate Intern - Information Security (Year Round)
@ Associated Bank | US WI Remote
Senior Offensive Security Engineer
@ CoStar Group | US-DC Washington, DC