2016
DOI: 10.1016/j.sysconle.2016.10.002
|View full text |Cite
|
Sign up to set email alerts
|

Antagonistic control

Abstract: In antagonistic control we find an input sequence that maximizes (or at least makes large) an objective that is minimized in typical control. Applications include designing inputs to attack a control system, worst-case analysis of a control system, and security assessment of a control system. The antagonistic control problem is not convex, and so cannot be efficiently solved. We present here a powerful convex-optimization-based heuristic for antagonistic control, based on the convex-concave procedure, which ca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…The case N z < N r captures attacks that maximize damage in N z steps, and prevent the defender noticing this in additional N r − N z steps. The case N z > N r models ambush attacks [37], where the attacker stealthily prepares N r steps, and then launches a not necessarily stealthy attack in the remaining time. Although we focus on the case N r = N z = N , the analysis that follows can be extended to cover the aforementioned cases as well.…”
Section: Problem Formulationmentioning
confidence: 99%
“…The case N z < N r captures attacks that maximize damage in N z steps, and prevent the defender noticing this in additional N r − N z steps. The case N z > N r models ambush attacks [37], where the attacker stealthily prepares N r steps, and then launches a not necessarily stealthy attack in the remaining time. Although we focus on the case N r = N z = N , the analysis that follows can be extended to cover the aforementioned cases as well.…”
Section: Problem Formulationmentioning
confidence: 99%
“…The work was supported by ARO through contract W911NF-17-1-0092, US DoE EERE award de-ee0008006, and NSF through grants CNS 1544771, EPCN 1711188, AMPS 1736448, and CAREER 1752362. sought via convex-concave approximations [6], semidefinite relaxations [3], or general nonlinear programming methods. Alternatively, an attacker may avoid the non-convex problem by selecting a target state (which is different from the system's intended operational state) and minimizing deviations from it [7].…”
Section: Introductionmentioning
confidence: 99%
“…Examples include adding a rogue car to a vehicle platoon [4] or malicious demand response in power grids [5]. Lastly, instead of injecting false sensor data or introducing adversarial agents, the attacker might take over the whole system and control it with an antagonistic algorithm [6] that maximizes damage.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation