TabVLA: Targeted Backdoor Attacks on Vision-Language-Action Models
2510.10932v1
cs.CR, cs.AI, cs.RO
2025-10-16
Авторы:
Zonghuan Xu, Xiang Zheng, Xingjun Ma, Yu-Gang Jiang
Abstract
With the growing deployment of Vision-Language-Action (VLA) models in
real-world embodied AI systems, their increasing vulnerability to backdoor
attacks poses a serious safety threat. A backdoored VLA agent can be covertly
triggered by a pre-injected backdoor to execute adversarial actions,
potentially causing system failures or even physical harm. Although backdoor
attacks on VLA models have been explored, prior work has focused only on
untargeted attacks, leaving the more practically threatening scenario of
targeted manipulation unexamined. In this paper, we study targeted backdoor
attacks on VLA models and introduce TabVLA, a novel framework that enables such
attacks via black-box fine-tuning. TabVLA explores two deployment-relevant
inference-time threat models: input-stream editing and in-scene triggering. It
formulates poisoned data generation as an optimization problem to improve
attack effectivess. Experiments with OpenVLA-7B on the LIBERO benchmark reveal
that the vision channel is the principal attack surface: targeted backdoors
succeed with minimal poisoning, remain robust across variations in trigger
design, and are degraded only by positional mismatches between fine-tuning and
inference triggers. We also investigate a potential detection-based defense
against TabVLA, which reconstructs latent visual triggers from the input stream
to flag activation-conditioned backdoor samples. Our work highlights the
vulnerability of VLA models to targeted backdoor manipulation and underscores
the need for more advanced defenses.
Ссылки и действия
Дополнительные ресурсы: