Coercing LLMs to do and reveal (almost) anything

AI-generated keywords: Adversarial Attacks Large Language Models Coercion Security Risks Mitigation

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • Authors: Jonas Geiping, Alex Stein, Manli Shu, Khalid Saifullah, Yuxin Wen, Tom Goldstein
  • Topic: Adversarial attacks on large language models (LLMs)
  • Attacks go beyond "jailbreaking" to make harmful statements
  • Overview of attack surfaces and goals for coercing LLMs
  • Categorization of attacks leading to misdirection, model control, denial-of-service, data extraction
  • Controlled experiments reveal many attacks stem from pre-training LLMs with coding capabilities
  • Identification of security risks posed by "glitch" tokens in LLM vocabularies
  • Importance of understanding and mitigating risks to prevent malicious manipulations
  • Need for enhanced security measures in training and deploying LLMs
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Jonas Geiping, Alex Stein, Manli Shu, Khalid Saifullah, Yuxin Wen, Tom Goldstein

32 pages. Implementation available at https://github.com/JonasGeiping/carving

Abstract: It has recently been shown that adversarial attacks on large language models (LLMs) can "jailbreak" the model into making harmful statements. In this work, we argue that the spectrum of adversarial attacks on LLMs is much larger than merely jailbreaking. We provide a broad overview of possible attack surfaces and attack goals. Based on a series of concrete examples, we discuss, categorize and systematize attacks that coerce varied unintended behaviors, such as misdirection, model control, denial-of-service, or data extraction. We analyze these attacks in controlled experiments, and find that many of them stem from the practice of pre-training LLMs with coding capabilities, as well as the continued existence of strange "glitch" tokens in common LLM vocabularies that should be removed for security reasons.

Submitted to arXiv on 21 Feb. 2024

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2402.14020v1

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

In their paper titled "Coercing LLMs to do and reveal (almost) anything," authors Jonas Geiping, Alex Stein, Manli Shu, Khalid Saifullah, Yuxin Wen, and Tom Goldstein delve into the realm of adversarial attacks on large language models (LLMs). They highlight that these attacks go beyond merely "jailbreaking" the model to make harmful statements. The authors provide a comprehensive overview of the various attack surfaces and goals that can be targeted when coercing LLMs. Through a series of concrete examples, the paper categorizes and systematizes different types of attacks that can lead to unintended behaviors such as misdirection, model control, denial-of-service, or data extraction. The authors conduct controlled experiments to analyze these attacks and discover that many stem from the practice of pre-training LLMs with coding capabilities. Additionally, they point out the presence of peculiar "glitch" tokens in common LLM vocabularies that pose security risks and should be eliminated. The research sheds light on the broader spectrum of adversarial threats faced by LLMs and emphasizes the importance of understanding and mitigating these risks in order to safeguard against potential malicious manipulations. The findings underscore the need for enhanced security measures in training and deploying large language models to prevent coercion into undesirable actions or disclosures.
Created on 27 May. 2024

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.