attack 2026

CtrlAttack: A Unified Attack on World-Model Control in Diffusion Models

Shuhan Xu 1, Siyuan Liang 2, Hongling Zheng 1, Yong Luo 1, Han Hu 3, Lefei Zhang 1, Dacheng Tao 2

0 citations

α

Published on arXiv

2603.13435

Input Manipulation Attack

OWASP ML Top 10 — ML01

Key Finding

Achieves over 90% attack success rate in white-box and over 80% in black-box settings while maintaining FID variation within 6 and FVD within 130

CtrlAttack

Novel technique introduced


Diffusion-based image-to-video (I2V) models increasingly exhibit world-model-like properties by implicitly capturing temporal dynamics. However, existing studies have mainly focused on visual quality and controllability, and the robustness of the state transition learned by the model remains understudied. To fill this gap, we are the first to analyze the vulnerability of I2V models, find that temporal control mechanisms constitute a new attack surface, and reveal the challenge of modeling them uniformly under different attack settings. Based on this, we propose a trajectory-control attack, called CtrlAttack, to interfere with state evolution during the generation process. Specifically, we represent the perturbation as a low-dimensional velocity field and construct a continuous displacement field via temporal integration, thereby affecting the model's state transitions while maintaining temporal consistency; meanwhile, we map the perturbation to the observation space, making the method applicable to both white-box and black-box attack settings. Experimental results show that even under low-dimensional and strongly regularized perturbation constraints, our method can still significantly disrupt temporal consistency by increasing the attack success rate (ASR) to over 90% in the white-box setting and over 80% in the black-box setting, while keeping the variation of the FID and FVD within 6 and 130, respectively, thus revealing the potential security risk of I2V models at the level of state dynamics.


Key Contributions

  • First analysis of vulnerability in temporal control mechanisms of image-to-video diffusion models
  • Trajectory-control attack using low-dimensional velocity fields to disrupt state evolution
  • Unified method applicable to both white-box and black-box settings via observation space mapping

🛡️ Threat Analysis

Input Manipulation Attack

Adversarial perturbation attack targeting image-to-video diffusion models at inference time, crafting inputs that disrupt temporal state transitions and world-model control mechanisms.


Details

Domains
visiongenerative
Model Types
diffusion
Threat Tags
white_boxblack_boxinference_timedigital
Applications
image-to-video generationvideo synthesis