Loading Now

Summary of A Realistic Threat Model For Large Language Model Jailbreaks, by Valentyn Boreiko et al.


A Realistic Threat Model for Large Language Model Jailbreaks

by Valentyn Boreiko, Alexander Panfilov, Vaclav Voracek, Matthias Hein, Jonas Geiping

First submitted to arxiv on: 21 Oct 2024

Categories

  • Main: Machine Learning (cs.LG)
  • Secondary: None

     Abstract of paper      PDF of paper


GrooveSquid.com Paper Summaries

GrooveSquid.com’s goal is to make artificial intelligence research accessible by summarizing AI papers in simpler terms. Each summary below covers the same AI paper, written at different levels of difficulty. The medium difficulty and low difficulty versions are original summaries written by GrooveSquid.com, while the high difficulty version is the paper’s original abstract. Feel free to learn from the version that suits you best!

Summary difficulty Written by Summary
High Paper authors High Difficulty Summary
Read the original abstract here
Medium GrooveSquid.com (original content) Medium Difficulty Summary
This research paper proposes a unified threat model for comparing jailbreaking attacks on safety-tuned Large Language Models (LLMs). The authors build an N-gram model based on 1T tokens to evaluate the deviation of a jailbreak from natural text, dubbed “perplexity”. They also consider computational budget in terms of total FLOPs. The paper benchmarks popular attacks under this new threat model and finds that attacks based on discrete optimization outperform recent LLM-based attacks. The authors note that effective attacks exploit rare N-grams, often absent from real-world text or specific to code datasets. This work provides a comprehensive framework for analyzing and comparing jailbreaking attacks.
Low GrooveSquid.com (original content) Low Difficulty Summary
Imagine trying to trick a super smart computer program called an LLM into saying something it wouldn’t normally say. These kinds of tricks are called “jailbreaking” attacks, and they can be very harmful. Researchers have developed different methods to do this, but they don’t all work equally well. This paper proposes a new way to compare these different attack methods to see which ones are most effective. They find that some attacks are better at getting the LLM to say something unusual than others. The researchers also discover that the most successful attacks target rare or unusual words and phrases, often found in code or artificial data.

Keywords

» Artificial intelligence  » N gram  » Optimization  » Perplexity