AI Navigate

CtrlAttack: A Unified Attack on World-Model Control in Diffusion Models

arXiv cs.CV / 3/17/2026

📰 NewsSignals & Early TrendsIdeas & Deep AnalysisModels & Research

Key Points

  • The paper analyzes the vulnerability of diffusion-based image-to-video models by examining their world-model-like temporal dynamics and identifies trajectory-control as a new attack surface.
  • It proposes CtrlAttack, which represents perturbations as a low-dimensional velocity field and creates a continuous displacement field via temporal integration to disrupt state evolution while preserving temporal coherence, usable in both white-box and black-box settings.
  • Experiments show high attack success rates (over 90% in white-box and over 80% in black-box) with limited degradation to perceptual metrics (FID and FVD changes within 6 and 130, respectively).
  • The work reveals security risks at the level of state dynamics in I2V models and calls for defenses to mitigate trajectory-level attacks.

Abstract

Diffusion-based image-to-video (I2V) models increasingly exhibit world-model-like properties by implicitly capturing temporal dynamics. However, existing studies have mainly focused on visual quality and controllability, and the robustness of the state transition learned by the model remains understudied. To fill this gap, we are the first to analyze the vulnerability of I2V models, find that temporal control mechanisms constitute a new attack surface, and reveal the challenge of modeling them uniformly under different attack settings. Based on this, we propose a trajectory-control attack, called CtrlAttack, to interfere with state evolution during the generation process. Specifically, we represent the perturbation as a low-dimensional velocity field and construct a continuous displacement field via temporal integration, thereby affecting the model's state transitions while maintaining temporal consistency; meanwhile, we map the perturbation to the observation space, making the method applicable to both white-box and black-box attack settings. Experimental results show that even under low-dimensional and strongly regularized perturbation constraints, our method can still significantly disrupt temporal consistency by increasing the attack success rate (ASR) to over 90% in the white-box setting and over 80% in the black-box setting, while keeping the variation of the FID and FVD within 6 and 130, respectively, thus revealing the potential security risk of I2V models at the level of state dynamics.