{"id":"https://openalex.org/W7134835730","doi":"https://doi.org/10.48550/arxiv.2603.08316","title":"SlowBA: An efficiency backdoor attack towards VLM-based GUI agents","display_name":"SlowBA: An efficiency backdoor attack towards VLM-based GUI agents","publication_year":2026,"publication_date":"2026-03-09","ids":{"openalex":"https://openalex.org/W7134835730","doi":"https://doi.org/10.48550/arxiv.2603.08316"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.08316","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.08316","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.08316","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5128685359","display_name":"Junxian Li","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Li, Junxian","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128650074","display_name":"Tu Lan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lan, Tu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128685340","display_name":"Haozhen Tan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tan, Haozhen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128643622","display_name":"Yan Meng","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Meng, Yan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5039106671","display_name":"Haojin Zhu","orcid":"https://orcid.org/0000-0001-5079-4556"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhu, Haojin","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5128685359"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.7925000190734863,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.7925000190734863,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.07490000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.04349999874830246,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9463000297546387},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6480000019073486},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5360999703407288},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.48100000619888306},{"id":"https://openalex.org/keywords/action","display_name":"Action (physics)","score":0.4747999906539917},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.4523000121116638},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.4388999938964844}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9463000297546387},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7469000220298767},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6480000019073486},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5360999703407288},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.508400022983551},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.48100000619888306},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.4747999906539917},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.4523000121116638},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.4388999938964844},{"id":"https://openalex.org/C37789001","wikidata":"https://www.wikidata.org/wiki/Q782543","display_name":"Graphical user interface","level":2,"score":0.43560001254081726},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.39969998598098755},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.37940001487731934},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.34060001373291016},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.31369999051094055},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.3068000078201294},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.29420000314712524},{"id":"https://openalex.org/C89505385","wikidata":"https://www.wikidata.org/wiki/Q47146","display_name":"User interface","level":2,"score":0.27549999952316284},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.258899986743927}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.08316","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.08316","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.08316","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.08316","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6735112071037292,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Modern":[0],"vision-language-model":[1],"(VLM)":[2],"based":[3],"graphical":[4],"user":[5,22],"interface":[6],"(GUI)":[7],"agents":[8,179],"are":[9],"expected":[10],"not":[11],"only":[12],"to":[13,19,21,43,71],"execute":[14],"actions":[15],"accurately":[16],"but":[17],"also":[18],"respond":[20],"instructions":[23],"with":[24,159],"low":[25],"latency.":[26],"While":[27],"existing":[28],"research":[29],"on":[30,35],"GUI-agent":[31],"security":[32,40,175],"mainly":[33],"focuses":[34],"manipulating":[36],"action":[37,189],"correctness,":[38],"the":[39,61,100,127,130,182],"risks":[41],"related":[42],"response":[44,73,145,192],"efficiency":[45],"remain":[46],"largely":[47,150],"unexplored.":[48],"In":[49,111],"this":[50],"paper,":[51],"we":[52,88,113],"introduce":[53],"SlowBA,":[54],"a":[55,90,160,172],"novel":[56],"backdoor":[57,93],"attack":[58,155],"that":[59,97,120,140,186],"targets":[60],"responsiveness":[62],"of":[63,129],"VLM-based":[64],"GUI":[65,124,178],"agents.":[66],"The":[67,154],"key":[68],"idea":[69],"is":[70],"manipulate":[72],"latency":[74,148],"by":[75],"inducing":[76],"excessively":[77],"long":[78],"reasoning":[79],"chains":[80],"under":[81,165],"specific":[82],"trigger":[83],"patterns.":[84],"To":[85],"achieve":[86],"this,":[87],"propose":[89],"two-stage":[91],"reward-level":[92],"injection":[94],"(RBI)":[95],"strategy":[96],"first":[98],"aligns":[99],"long-response":[101],"format":[102],"and":[103,137,147,164,180,191],"then":[104],"learns":[105],"trigger-aware":[106],"activation":[107],"through":[108],"reinforcement":[109],"learning.":[110],"addition,":[112],"design":[114],"realistic":[115],"pop-up":[116],"windows":[117],"as":[118],"triggers":[119],"naturally":[121],"appear":[122],"in":[123,177,198],"environments,":[125],"improving":[126],"stealthiness":[128],"attack.":[131],"Extensive":[132],"experiments":[133],"across":[134],"multiple":[135],"datasets":[136],"baselines":[138],"demonstrate":[139],"SlowBA":[141],"can":[142,195],"significantly":[143],"increase":[144],"length":[146],"while":[149],"preserving":[151],"task":[152],"accuracy.":[153],"remains":[156],"effective":[157],"even":[158],"small":[161],"poisoning":[162],"ratio":[163],"several":[166],"defense":[167],"settings.":[168],"These":[169],"findings":[170],"reveal":[171],"previously":[173],"overlooked":[174],"vulnerability":[176],"highlight":[181],"need":[183],"for":[184],"defenses":[185],"consider":[187],"both":[188],"correctness":[190],"efficiency.":[193],"Code":[194],"be":[196],"found":[197],"https://github.com/tu-tuing/SlowBA.":[199]},"counts_by_year":[],"updated_date":"2026-03-11T06:17:14.884878","created_date":"2026-03-11T00:00:00"}
