Data Poisoning Attacks Can Systematically Destabilize Data-Driven Control Synthesis
Pith reviewed 2026-05-10 17:08 UTC · model grok-4.3
The pith
An attacker can poison data to force any synthesized linear state-feedback controller to destabilize the physical system, without knowing the model or synthesis procedure.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
An attacker can systematically poison the data used for control synthesis, causing any linear state-feedback controller synthesized by the planner to destabilize the physical system. The attacker achieves this without knowledge of the system model or the controller synthesis procedure by developing a recursive data-poisoning mechanism that generates falsified state trajectories, inducing a precise geometric shift in the apparent system dynamics. The results establish that data-driven control pipelines can be deterministically destabilized by model-agnostic attacks operating solely at the data level.
What carries the argument
A recursive data-poisoning mechanism that generates falsified state trajectories inducing a precise geometric shift in the apparent system dynamics.
If this is right
- Any linear state-feedback controller produced by the synthesis procedure from the poisoned data will destabilize the true system.
- The attack requires no knowledge of the system matrices or of the particular synthesis algorithm employed.
- The same poisoning construction works for both noise-free and noisy data sets.
- Data-driven control pipelines can be deterministically destabilized by attacks that act only on the collected trajectories.
Where Pith is reading between the lines
- Robustness checks or anomaly detection on collected trajectories could become necessary additions to data-driven pipelines.
- Similar poisoning strategies may affect other data-driven tasks such as system identification or reinforcement learning that rely on trajectory data.
- The geometric-shift view suggests that defenses could target preservation of certain invariant subspaces rather than statistical outlier removal.
Load-bearing premise
The attacker can inject arbitrarily falsified state trajectories into the data set and the underlying synthesis method is sensitive to geometric shifts in the collected trajectories.
What would settle it
A concrete linear system and data set in which the controller synthesized from the poisoned trajectories produces closed-loop eigenvalues with positive real part when applied to the true (unpoisoned) dynamics.
Figures
read the original abstract
Data-driven control has emerged as a powerful paradigm for synthesizing controllers directly from data, bypassing explicit model identification. However, this reliance on data introduces new and largely unexplored vulnerabilities. In this paper, we show that an attacker can systematically poison the data used for control synthesis, causing any linear state-feedback controller synthesized by the planner to destabilize the physical system. Concerningly, we show that the attacker can achieve this objective without knowledge of the system model or the controller synthesis procedure. To this end, we develop a recursive data-poisoning mechanism that generates falsified state trajectories, inducing a precise geometric shift in the apparent system dynamics. More broadly, our results establish that data-driven control pipelines can be deterministically destabilized by model-agnostic attacks operating solely at the data level. Numerical simulations corroborate these findings for both noise-free and noisy data.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper claims that an attacker can systematically poison the data used for data-driven control synthesis by recursively generating falsified state trajectories. This induces a geometric shift in the apparent dynamics such that any linear state-feedback controller synthesized from the poisoned data (by an arbitrary procedure) will destabilize the true physical system. The attack requires no knowledge of the system model or the synthesis method, and the claim is supported by a theoretical mechanism plus numerical simulations for both noise-free and noisy data.
Significance. If the central claim holds, the work would be significant for exposing a model-agnostic vulnerability in data-driven control pipelines, showing that deterministic destabilization is possible solely through data-level attacks. The recursive poisoning construction and corroborating simulations are concrete strengths that make the result falsifiable and potentially impactful for security considerations in control applications.
major comments (2)
- [§3] §3 (recursive poisoning mechanism): the construction generates falsified trajectories to produce a geometric shift, but the argument that this forces instability on the unknown true (A,B) for arbitrary synthesis procedures is not load-bearing. A fixed or recursively generated fake trajectory set cannot guarantee that every possible synthesized K satisfies instability of the true closed-loop matrix, as the choice is independent of (A,B).
- [Main theorem (likely §4)] Main theorem (likely §4): the claim of deterministic, model-agnostic destabilization for 'any' linear state-feedback controller is contradicted by the fact that closed-loop stability depends on the specific unknown plant; no choice of poisoned data independent of (A,B) can ensure the property holds universally across all possible true systems and all possible synthesis methods.
minor comments (2)
- [Abstract] The abstract and introduction would benefit from an explicit statement of the data-driven synthesis operator (e.g., whether it relies on Willems' lemma or a specific regression) to clarify the scope of 'any' synthesis procedure.
- [Preliminaries] Notation for the geometric shift and the poisoned data matrices should be introduced with a dedicated preliminary subsection for clarity.
Simulated Author's Rebuttal
We thank the referee for the careful reading and constructive feedback on our manuscript. The comments highlight important aspects of the recursive poisoning construction and the scope of the main theorem. We address each point below and indicate where revisions will be incorporated to clarify assumptions and strengthen the claims.
read point-by-point responses
-
Referee: [§3] §3 (recursive poisoning mechanism): the construction generates falsified trajectories to produce a geometric shift, but the argument that this forces instability on the unknown true (A,B) for arbitrary synthesis procedures is not load-bearing. A fixed or recursively generated fake trajectory set cannot guarantee that every possible synthesized K satisfies instability of the true closed-loop matrix, as the choice is independent of (A,B).
Authors: We appreciate this observation on the load-bearing nature of the argument. The recursive poisoning mechanism generates falsified trajectories by iteratively solving for state-input pairs that lie in a shifted subspace of the data matrix, inducing a fixed geometric offset in the apparent (A,B) pair. This offset is constructed without reference to the true plant and ensures that any synthesis procedure relying on the poisoned data to compute a stabilizing K for the apparent dynamics will produce a controller whose closed-loop eigenvalues lie outside the stability region when applied to the true system. However, we acknowledge that the original wording for completely arbitrary procedures (including those that ignore the data) is overly broad. We will revise §3 to explicitly state that the guarantee applies to data-dependent synthesis methods (e.g., least-squares, behavioral, or optimization-based approaches that use the provided trajectories). Additional explanatory text and a clarifying remark on the independence from (A,B) will be added. revision: yes
-
Referee: [Main theorem (likely §4)] Main theorem (likely §4): the claim of deterministic, model-agnostic destabilization for 'any' linear state-feedback controller is contradicted by the fact that closed-loop stability depends on the specific unknown plant; no choice of poisoned data independent of (A,B) can ensure the property holds universally across all possible true systems and all possible synthesis methods.
Authors: The referee correctly notes that stability is inherently plant-dependent. Our main theorem establishes that a single, model-agnostic poisoning strategy—independent of the specific values of (A,B)—induces a geometric shift sufficient to destabilize the true closed-loop for any linear state-feedback controller synthesized from the resulting data. The proof proceeds by showing that the poisoned dataset is consistent only with an apparent dynamics whose stabilizing controllers, when applied to the true plant, necessarily produce an unstable matrix; this holds for any fixed true (A,B) without the attacker needing its value. We agree that the phrasing “any” and “arbitrary” can be misinterpreted as applying even to synthesis methods that disregard the data or to a universal guarantee over all conceivable plants simultaneously. We will revise the theorem statement, abstract, and introduction to clarify that the result concerns synthesis procedures that operate on the poisoned data and that the attack succeeds for any given unknown plant without requiring knowledge of that plant. These changes will be accompanied by a short discussion of the scope. revision: yes
Circularity Check
No significant circularity in the derivation chain
full rationale
The paper constructs an explicit recursive poisoning attack that generates falsified trajectories to induce a geometric shift in the collected data, from which any linear state-feedback controller is shown to destabilize the plant. This follows from properties of linear trajectory geometry and does not reduce to a self-definition, a fitted parameter renamed as a prediction, or a load-bearing self-citation. The model-agnostic claim is derived directly from the attack construction rather than from quantities defined circularly in terms of the target system or synthesis procedure. No uniqueness theorems or ansatzes are smuggled via self-citation, and the result is not a renaming of a known empirical pattern.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption Collected state trajectories are generated by an underlying linear time-invariant system
Reference graph
Works this paper leans on
-
[1]
Ljung,System Identification: Theory for the User
L. Ljung,System Identification: Theory for the User. Prentice Hall, 1999
work page 1999
-
[2]
Formulas for data-driven control: Stabi- lization, optimality, and robustness,
C. De Persis and P. Tesi, “Formulas for data-driven control: Stabi- lization, optimality, and robustness,”IEEE Transactions on Automatic Control, vol. 65, no. 3, pp. 909–924, 2019
work page 2019
-
[3]
Data informativity: a new perspective on data-driven analysis and control,
H. J. Van Waarde, J. Eising, H. L. Trentelman, and M. K. Camlibel, “Data informativity: a new perspective on data-driven analysis and control,”IEEE Transactions on Automatic Control, 2020
work page 2020
-
[4]
Data-driven control of complex networks,
G. Baggio, D. S. Bassett, and F. Pasqualetti, “Data-driven control of complex networks,”Nature communications, vol. 12, no. 1, pp. 1–13, 2021
work page 2021
-
[5]
Behavioral systems theory in data-driven analysis, signal processing, and control,
I. Markovsky and F. D ¨orfler, “Behavioral systems theory in data-driven analysis, signal processing, and control,”Annual Reviews in Control, vol. 52, pp. 42–64, 2021
work page 2021
-
[6]
Dynamic attack detection in cyber-physical systems with side initial state information,
Y . Chen, S. Kar, and J. M. Moura, “Dynamic attack detection in cyber-physical systems with side initial state information,”IEEE Transactions on Automatic Control, vol. 62, no. 9, pp. 4618–4624, 2016
work page 2016
-
[7]
Summation detector for false data-injection attack in cyber-physical systems,
D. Ye and T.-Y . Zhang, “Summation detector for false data-injection attack in cyber-physical systems,”IEEE transactions on cybernetics, vol. 50, no. 6, pp. 2338–2345, 2019
work page 2019
-
[8]
Attack detection and identi- fication in cyber-physical systems,
F. Pasqualetti, F. D ¨orfler, and F. Bullo, “Attack detection and identi- fication in cyber-physical systems,”IEEE transactions on automatic control, vol. 58, no. 11, pp. 2715–2729, 2013
work page 2013
-
[9]
On the performance degradation of cyber- physical systems under stealthy integrity attacks,
Y . Mo and B. Sinopoli, “On the performance degradation of cyber- physical systems under stealthy integrity attacks,”IEEE Transactions on Automatic Control, vol. 61, no. 9, pp. 2618–2624, 2015
work page 2015
-
[10]
False data injection on state estimation in power systems—attacks, impacts, and defense: A survey,
R. Deng, G. Xiao, R. Lu, H. Liang, and A. V . Vasilakos, “False data injection on state estimation in power systems—attacks, impacts, and defense: A survey,”IEEE transactions on industrial informatics, vol. 13, no. 2, pp. 411–423, 2016
work page 2016
-
[11]
Data Informativity under Data Perturbation
T. Kaminaga and H. Sasahara, “Data informativity under data pertur- bation,”arXiv preprint arXiv:2505.01641, 2025
work page internal anchor Pith review Pith/arXiv arXiv 2025
-
[12]
Data-injection attacks using historical inputs and outputs,
R. Alisic and H. Sandberg, “Data-injection attacks using historical inputs and outputs,” in2021 European Control Conference (ECC). IEEE, 2021, pp. 1399–1405
work page 2021
-
[13]
Adversarial attacks to direct data-driven control for destabilization,
H. Sasahara, “Adversarial attacks to direct data-driven control for destabilization,” in2023 62nd IEEE Conference on Decision and Control (CDC). IEEE, 2023, pp. 7094–7099
work page 2023
-
[14]
Deception against data-driven linear-quadratic control,
F. Fotiadis, A. Kanellopoulos, K. G. Vamvoudakis, and U. Topcu, “De- ception against data-driven linear-quadratic control,”arXiv preprint arXiv:2506.11373, 2025
-
[15]
Poisoning attacks against data-driven predictive control,
Y . Yu, R. Zhao, S. Chinchali, and U. Topcu, “Poisoning attacks against data-driven predictive control,” in2023 American Control Conference (ACC). IEEE, 2023, pp. 545–550
work page 2023
-
[16]
A systems and control perspective of cps security,
S. M. Dibaji, M. Pirani, D. B. Flamholz, A. M. Annaswamy, K. H. Johansson, and A. Chakrabortty, “A systems and control perspective of cps security,”Annual reviews in control, vol. 47, pp. 394–411, 2019
work page 2019
-
[17]
Decentralized learning robust to data poisoning attacks,
Y . Mao, D. Data, S. Diggavi, and P. Tabuada, “Decentralized learning robust to data poisoning attacks,” in2022 IEEE 61st Conference on Decision and Control (CDC). IEEE, 2022, pp. 6788–6793
work page 2022
-
[18]
Poisoning attacks against data-driven control methods,
A. Russo and A. Proutiere, “Poisoning attacks against data-driven control methods,” in2021 American Control Conference (ACC). IEEE, 2021, pp. 3234–3241
work page 2021
-
[19]
A note on persistency of excitation,
J. C. Willems, P. Rapisarda, I. Markovsky, and B. D. Moor, “A note on persistency of excitation,”Systems & Control Letters, vol. 54, no. 4, pp. 325–329, 2005
work page 2005
-
[20]
CVX: Matlab software for disciplined convex programming,
M. Grant, S. Boyd, and Y . Ye, “CVX: Matlab software for disciplined convex programming,” 2008. VII. APPENDIX Proposition 2(Model-based reinterpretation of poisoned data from Algorithm 1)Suppose the poisoned trajectory matrices( ˜X−, ˜X+)are generated by Algorithm 1. Then, the poisoned dataset emulates the state trajectory of an apparent system given byx(...
work page 2008
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.