Black-Box Evasion Attacks on Data-Driven Open RAN Apps: Tailored Design and Experimental Evaluation

📅 2025-10-20
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work identifies a data-driven black-box evasion attack threat against xApps/rApps in O-RAN architectures, stemming from their direct access to RAN data. To target machine learning models deployed in both near-real-time (Near-RT) and non-real-time (Non-RT) RIC components, we propose a novel black-box attack framework that jointly optimizes latency constraints and attack efficacy—integrating model cloning, input perturbation, universal adversarial perturbations (UAPs), and targeted UAPs, guided by fine-grained threat modeling for precise exploitation. We conduct the first systematic adversarial evaluation of multiple ML-driven RAN applications—including interference classification and energy-efficient control—on both a real-world O-RAN testbed and a high-fidelity simulation platform. Experimental results demonstrate that the attack significantly degrades application performance and network efficiency, while exhibiting strong robustness against state-of-the-art defensive mechanisms. Our findings provide critical empirical evidence and establish a new attack paradigm for securing O-RAN systems.

Technology Category

Application Category

📝 Abstract
The impending adoption of Open Radio Access Network (O-RAN) is fueling innovation in the RAN towards data-driven operation. Unlike traditional RAN where the RAN data and its usage is restricted within proprietary and monolithic RAN equipment, the O-RAN architecture opens up access to RAN data via RAN intelligent controllers (RICs), to third-party machine learning (ML) powered applications - rApps and xApps - to optimize RAN operations. Consequently, a major focus has been placed on leveraging RAN data to unlock greater efficiency gains. However, there is an increasing recognition that RAN data access to apps could become a source of vulnerability and be exploited by malicious actors. Motivated by this, we carry out a comprehensive investigation of data vulnerabilities on both xApps and rApps, respectively hosted in Near- and Non-real-time (RT) RIC components of O-RAN. We qualitatively analyse the O-RAN security mechanisms and limitations for xApps and rApps, and consider a threat model informed by this analysis. We design a viable and effective black-box evasion attack strategy targeting O-RAN RIC Apps while accounting for the stringent timing constraints and attack effectiveness. The strategy employs four key techniques: the model cloning algorithm, input-specific perturbations, universal adversarial perturbations (UAPs), and targeted UAPs. This strategy targets ML models used by both xApps and rApps within the O-RAN system, aiming to degrade network performance. We validate the effectiveness of the designed evasion attack strategy and quantify the scale of performance degradation using a real-world O-RAN testbed and emulation environments. Evaluation is conducted using the Interference Classification xApp and the Power Saving rApp as representatives for near-RT and non-RT RICs. We also show that the attack strategy is effective against prominent defense techniques for adversarial ML.
Problem

Research questions and friction points this paper is trying to address.

Investigating data vulnerabilities in O-RAN machine learning applications
Designing black-box evasion attacks on RIC apps under timing constraints
Evaluating attack effectiveness against adversarial ML defenses in O-RAN
Innovation

Methods, ideas, or system contributions that make the work stand out.

Model cloning algorithm for black-box evasion attacks
Input-specific perturbations to degrade network performance
Universal adversarial perturbations targeting O-RAN ML models
🔎 Similar Papers
No similar papers found.