Loading Now

Summary of Cold-attack: Jailbreaking Llms with Stealthiness and Controllability, by Xingang Guo et al.


COLD-Attack: Jailbreaking LLMs with Stealthiness and Controllability

by Xingang Guo, Fangxu Yu, Huan Zhang, Lianhui Qin, Bin Hu

First submitted to arxiv on: 13 Feb 2024

Categories

  • Main: Machine Learning (cs.LG)
  • Secondary: Artificial Intelligence (cs.AI); Computation and Language (cs.CL)

     Abstract of paper      PDF of paper


GrooveSquid.com Paper Summaries

GrooveSquid.com’s goal is to make artificial intelligence research accessible by summarizing AI papers in simpler terms. Each summary below covers the same AI paper, written at different levels of difficulty. The medium difficulty and low difficulty versions are original summaries written by GrooveSquid.com, while the high difficulty version is the paper’s original abstract. Feel free to learn from the version that suits you best!

Summary difficulty Written by Summary
High Paper authors High Difficulty Summary
Read the original abstract here
Medium GrooveSquid.com (original content) Medium Difficulty Summary
This paper addresses the growing concern of “jailbreaks” on large language models (LLMs). By exploring controllable jailbreaking, researchers aim to develop methods that enforce control on LLM attacks. The study formalizes the problem and builds a connection between it and controllable text generation. The authors adapt an existing algorithm called Energy-based Constrained Decoding with Langevin Dynamics (COLD) to create the COLD-Attack framework, which automates the search for adversarial LLM attacks under various control requirements. This framework enables diverse new jailbreak scenarios, including revising user queries and inserting stealthy attacks in context.
Low GrooveSquid.com (original content) Low Difficulty Summary
Large language models have recently experienced “jailbreaks.” To make these models safer, researchers need to understand how to control these attacks. The paper studies controllable jailbreaking and develops a method called COLD-Attack. This framework helps find bad attacks that can be controlled. It also shows how to revise user queries or hide attacks in text.

Keywords

* Artificial intelligence  * Text generation