Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks.
Daniel KangXuechen LiIon StoicaCarlos GuestrinMatei ZahariaTatsunori HashimotoPublished in: SP (Workshops) (2024)
Keyphrases
- security threats
- security mechanisms
- security problems
- security breaches
- computer security
- security measures
- security vulnerabilities
- information security
- denial of service attacks
- security protocols
- iso iec
- java card
- cyber attacks
- security issues
- countermeasures
- network security
- stream cipher
- access control
- security requirements
- security management
- security risks
- malicious users
- biometric template
- chosen plaintext
- security flaws
- smart card
- intrusion detection