Hybrid Design of Multiplicative Watermarking for Defense Against Malicious Parameter Identification

09/05/2023
by   Jiaxuan Zhang, et al.
0

Watermarking is a promising active diagnosis technique for detection of highly sophisticated attacks, but is vulnerable to malicious agents that use eavesdropped data to identify and then remove or replicate the watermark. In this work, we propose a hybrid multiplicative watermarking (HMWM) scheme, where the watermark parameters are periodically updated, following the dynamics of the unobservable states of specifically designed piecewise affine (PWA) hybrid systems. We provide a theoretical analysis of the effects of this scheme on the closed-loop performance, and prove that stability properties are preserved. Additionally, we show that the proposed approach makes it difficult for an eavesdropper to reconstruct the watermarking parameters, both in terms of the associated computational complexity and from a systems theoretic perspective.

READ FULL TEXT
research
09/13/2021

SignGuard: Byzantine-robust Federated Learning through Collaborative Malicious Gradient Filtering

Gradient-based training in federated learning is known to be vulnerable ...
research
03/18/2020

Malicious Experts versus the multiplicative weights algorithm in online prediction

We consider a prediction problem with two experts and a forecaster. We a...
research
10/01/2021

Design of multiplicative watermarking against covert attacks

This paper addresses the design of an active cyberattack detection archi...
research
03/04/2022

Robust Approximate Simulation for Hierarchical Control of Piecewise Affine Systems under Bounded Disturbances

Piecewise affine (PWA) systems are widely applied in many practical case...
research
10/03/2021

Hybrid Event Shaping to Stabilize Periodic Hybrid Orbits

Many controllers for legged robotic systems leverage open- or closed-loo...
research
10/06/2021

Detecting and Quantifying Malicious Activity with Simulation-based Inference

We propose the use of probabilistic programming techniques to tackle the...

Please sign up or login with your details

Forgot password? Click here to reset