Attacks and Mitigations for Distributed Governance of Agentic AI under Byzantine Adversaries
Matthew D. Laws, Alina Oprea, Cristina Nita-Rotaru
TLDR
This paper analyzes attacks on agentic AI governance from compromised centralized providers and proposes Byzantine-resilient, monitoring, and auditing solutions.
Key contributions
- Analyzes attacks from a compromised centralized Provider in agentic AI governance systems.
- Identifies and executes concrete attacks like undermining agent attributability and bypassing access control.
- Proposes SAGA-BFT for strong Byzantine resilience, and SAGA-MON/SAGA-AUD for lightweight protection.
- Introduces SAGA-HYB, a hybrid architecture balancing security and performance for agentic AI governance.
Why it matters
Agentic AI governance is critical, but current solutions are vulnerable to compromised central providers. This paper identifies severe attacks and offers robust, distributed, and efficient mitigations, crucial for securing future AI systems.
Original Abstract
Agentic AI governance is a critical component of agentic AI infrastructure ensuring that agents follow their owner's communication and interaction policies, and providing protection against attacks from malicious agents. The state-of-the-art solution, SAGA, assumes a logically centralized point of trust, the Provider, which serves as a repository for user and agent information and actively enforces policies. While SAGA provides protection against malicious agents, it remains vulnerable to a malicious Provider that deviates from the protocol, undermining the security of the identity and access control infrastructure. Deployment on both private and public clouds, each susceptible to insider threats, further increases the risk of Provider compromise. In this work, we analyze the attacks that can be mounted from a compromised Provider, taking into account the different system components and realistic deployments. We identify and execute several concrete attacks with devastating effects: undermining agent attributability, extracting private data, or bypassing access control. We then present three types of solutions for securing the Provider that offer different trade-offs between security and performance. We first present SAGA-BFT, a fully byzantine-resilient architecture that provides the strongest protection, but incurs significant performance degradation, due to the high-cost of byzantine resilient protocols. We then propose SAGA-MON and SAGA-AUD, two novel solutions that leverage lightweight server-side monitoring or client-side auditing to provide protection against most classes of attacks with minimal overhead. Finally, we propose SAGA-HYB, a hybrid architecture that combines byzantine-resilience with monitoring and auditing to trade-off security for performance. We evaluate all the architectures and compare them with SAGA. We discuss which solution is best and under what conditions.
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.