Use of LLMs for Illicit Purposes: Threats, Prevention Measures, and Vulnerabilities

08/24/2023
by   Maximilian Mozes, et al.
0

Spurred by the recent rapid increase in the development and distribution of large language models (LLMs) across industry and academia, much recent work has drawn attention to safety- and security-related threats and vulnerabilities of LLMs, including in the context of potentially criminal activities. Specifically, it has been shown that LLMs can be misused for fraud, impersonation, and the generation of malware; while other authors have considered the more general problem of AI alignment. It is important that developers and practitioners alike are aware of security-related problems with such models. In this paper, we provide an overview of existing - predominantly scientific - efforts on identifying and mitigating threats and vulnerabilities arising from LLMs. We present a taxonomy describing the relationship between threats caused by the generative capabilities of LLMs, prevention measures intended to address such threats, and vulnerabilities arising from imperfect prevention measures. With our work, we hope to raise awareness of the limitations of LLMs in light of such security concerns, among both experienced developers and novel users of such technologies.

READ FULL TEXT

page 2

page 18

research
01/18/2023

Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy

In this article, we propose the Artificial Intelligence Security Taxonom...
research
03/24/2021

A New Paradigm of Threats in Robotics Behaviors

Robots applications in our daily life increase at an unprecedented pace....
research
08/01/2023

Assessment of POS Owners Awareness of Cybersecurity and Insider Threats in POS Kiosks Related Financial Crimes

The introduction of point of sales POS technologies as a payment system ...
research
05/29/2023

Chatbots to ChatGPT in a Cybersecurity Space: Evolution, Vulnerabilities, Attacks, Challenges, and Future Recommendations

Chatbots shifted from rule-based to artificial intelligence techniques a...
research
10/10/2022

A Prospective Analysis of Security Vulnerabilities within Link Traversal-Based Query Processing (Extended Version)

The societal and economical consequences surrounding Big Data-driven pla...
research
08/30/2018

Inadequate Risk Analysis Might Jeopardize The Functional Safety of Modern Systems

In the early 90s, researchers began to focus on security as an important...
research
11/07/2022

The Dark Side of The Internet of Vehicles: A Survey of the State of IoV and its Security Vulnerabilities

For the smart vehicular network, we studied two technologies to realize ...

Please sign up or login with your details

Forgot password? Click here to reset