{"id":74,"date":"2025-09-11T06:13:47","date_gmt":"2025-09-11T10:13:47","guid":{"rendered":"https:\/\/sites.bu.edu\/securingmas\/?p=74"},"modified":"2025-09-11T06:13:47","modified_gmt":"2025-09-11T10:13:47","slug":"modeling-physical-masquerade-attacks","status":"publish","type":"post","link":"https:\/\/sites.bu.edu\/securingmas\/2025\/09\/11\/modeling-physical-masquerade-attacks\/","title":{"rendered":"Modeling physical masquerade attacks"},"content":{"rendered":"<p>We have formally defined the security problem of a<br \/>\nstealthy adversary masquerading as a properly functioning agent.\u00a0 perspectives from cybersecurity.<\/p>\n<p>We introduced the concept of physical masquerade attacks in the context of multi-agent path finding, where a compromised insider in a multi-agent system attempts to gain access into unauthorized, forbidden locations without being noticed; we coined the term <em>deviation attack<\/em> for this type of malicious maneuver.<\/p>\n<figure id=\"attachment75\" aria-describedby=\"caption-attachment75\" style=\"width: 646px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" src=\"\/securingmas\/files\/2025\/09\/deviation-attack-636x313.png\" alt=\"An illustration of the multi-agent path finding problem in the presence of deviation attacks, and of our defense approach based on co-observations.\" width=\"636\" height=\"313\" class=\"size-medium wp-image-75\" srcset=\"https:\/\/sites.bu.edu\/securingmas\/files\/2025\/09\/deviation-attack-636x313.png 636w, https:\/\/sites.bu.edu\/securingmas\/files\/2025\/09\/deviation-attack-1024x504.png 1024w, https:\/\/sites.bu.edu\/securingmas\/files\/2025\/09\/deviation-attack-768x378.png 768w, https:\/\/sites.bu.edu\/securingmas\/files\/2025\/09\/deviation-attack.png 1273w\" sizes=\"(max-width: 636px) 100vw, 636px\" \/><figcaption id=\"caption-attachment75\" class=\"wp-caption-text\">An illustration of the multi-agent path finding problem in the presence of deviation attacks, and of our defense approach based on co-observations. The sensitive region is marked with S. Left: a traditional (minimal length) solution is not secure, since there exists a deviation attack for the square agent (dotted line).<br \/>Right: if we add the a constraint that agents need to observe each other in the middle of their paths, neither agent can reach the secure location without breaking with the expected observation schedule.<\/figcaption><\/figure>\n<p>We provide a constraint-based formulation of multi-agent pathfinding that yields multi-agent plans that are provably resilient to physical masquerade attacks. This formalization leverages inter-agent observations to facilitate introspective monitoring to guarantee resilience. Furthermore, we have show that is important to distinguish between a <em>cautious attacker<\/em> (i.e., an attacker that aims to avoid detection under every possible circumstance) and a <em>bold attackers<\/em> (i.e., attackers that tolerate a risk of detection)<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have formally defined the security problem of a stealthy adversary masquerading as a properly functioning agent.\u00a0 perspectives from cybersecurity. We introduced the concept of physical masquerade attacks in the context of multi-agent path finding, where a compromised insider in a multi-agent system attempts to gain access into unauthorized, forbidden locations without being noticed; we [&hellip;]<\/p>\n","protected":false},"author":11510,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.bu.edu\/securingmas\/wp-json\/wp\/v2\/posts\/74"}],"collection":[{"href":"https:\/\/sites.bu.edu\/securingmas\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.bu.edu\/securingmas\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.bu.edu\/securingmas\/wp-json\/wp\/v2\/users\/11510"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.bu.edu\/securingmas\/wp-json\/wp\/v2\/comments?post=74"}],"version-history":[{"count":1,"href":"https:\/\/sites.bu.edu\/securingmas\/wp-json\/wp\/v2\/posts\/74\/revisions"}],"predecessor-version":[{"id":76,"href":"https:\/\/sites.bu.edu\/securingmas\/wp-json\/wp\/v2\/posts\/74\/revisions\/76"}],"wp:attachment":[{"href":"https:\/\/sites.bu.edu\/securingmas\/wp-json\/wp\/v2\/media?parent=74"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.bu.edu\/securingmas\/wp-json\/wp\/v2\/categories?post=74"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.bu.edu\/securingmas\/wp-json\/wp\/v2\/tags?post=74"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}