Table of Contents
Fetching ...

Inception: Efficiently Computable Misinformation Attacks on Markov Games

Jeremy McMahan, Young Wu, Yudong Chen, Xiaojin Zhu, Qiaomin Xie

TL;DR

This work presents a security vulnerability arising from standard game assumptions under misinformation, and provides an efficient inception ("planting an idea in someone's mind") attack algorithm to find the optimal fake reward function within a restricted set of reward functions with dominant strategies.

Abstract

We study security threats to Markov games due to information asymmetry and misinformation. We consider an attacker player who can spread misinformation about its reward function to influence the robust victim player's behavior. Given a fixed fake reward function, we derive the victim's policy under worst-case rationality and present polynomial-time algorithms to compute the attacker's optimal worst-case policy based on linear programming and backward induction. Then, we provide an efficient inception ("planting an idea in someone's mind") attack algorithm to find the optimal fake reward function within a restricted set of reward functions with dominant strategies. Importantly, our methods exploit the universal assumption of rationality to compute attacks efficiently. Thus, our work exposes a security vulnerability arising from standard game assumptions under misinformation.

Inception: Efficiently Computable Misinformation Attacks on Markov Games

TL;DR

This work presents a security vulnerability arising from standard game assumptions under misinformation, and provides an efficient inception ("planting an idea in someone's mind") attack algorithm to find the optimal fake reward function within a restricted set of reward functions with dominant strategies.

Abstract

We study security threats to Markov games due to information asymmetry and misinformation. We consider an attacker player who can spread misinformation about its reward function to influence the robust victim player's behavior. Given a fixed fake reward function, we derive the victim's policy under worst-case rationality and present polynomial-time algorithms to compute the attacker's optimal worst-case policy based on linear programming and backward induction. Then, we provide an efficient inception ("planting an idea in someone's mind") attack algorithm to find the optimal fake reward function within a restricted set of reward functions with dominant strategies. Importantly, our methods exploit the universal assumption of rationality to compute attacks efficiently. Thus, our work exposes a security vulnerability arising from standard game assumptions under misinformation.

Paper Structure

This paper contains 36 sections, 9 theorems, 27 equations, 3 figures, 3 algorithms.

Key Result

Proposition 1

For any fixed $R^{\dagger}_2$, under assum: ur and assum: wcr, $(\pi_1^*,\pi_2^*)$ is a solution to the game if and only if $(\pi_1^*,\pi_2^*) \in \Pi_1^*(R^{\dagger}_2) \times \Pi_2^*(R^{\dagger}_2)$.

Figures (3)

  • Figure 1: Inception Example
  • Figure 2: Best-response LPs
  • Figure 3: Attacker's Inner Minimization

Theorems & Definitions (19)

  • Example 1: Naive Belief
  • Example 2: Secure Belief
  • Example 3: Rational Belief
  • Proposition 1: Game Outcomes
  • Definition 1: Inception
  • Example 4: Inception Attack
  • Lemma 1
  • Lemma 2
  • Theorem 1
  • Lemma 3
  • ...and 9 more