Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks.
Daniel KangXuechen LiIon StoicaCarlos GuestrinMatei ZahariaTatsunori HashimotoPublished in: CoRR (2023)
Keyphrases
- security threats
- security protocols
- security problems
- security mechanisms
- computer security
- java card
- access control
- countermeasures
- fault injection
- security vulnerabilities
- security breaches
- cyber attacks
- iso iec
- information security
- smart card
- security risks
- denial of service attacks
- security measures
- insider attacks
- stream cipher
- security issues
- cryptographic algorithms
- key management
- malicious users
- malicious attacks
- security flaws
- network security
- intrusion detection and prevention
- cryptographic protocols
- chosen plaintext
- information leakage
- unauthorized access
- identity theft
- security management
- resource constrained
- security requirements