Hi Thomson, thank you for the question - there is a wide array of vulnerabilities out there but they can often be grouped into themes of the attack someone is using. At the moment, what we are seeing is that most (~90%) attacks exploit the capabilities of an AI system rather than the model itself - this could be tactics like impersonation, scaling and amplification, or "sockpuppeting" (hiding behind a false identity to deceive). There is a great Google DeepMind paper on Generative AI Misuse (Taxonomy of Tactics) that is a really interesting read to understand the threat landscape :) hope that helps but happy to answer any follow-up questions!
Thanks Tom
there are many - here are a few headlines: data poisoning – data leakage – ai supply chain attack – inference attack – extractioj – prompt injection – insecure output validation – model denial of service
Thanks Rick
extractioj -> extraction (typo)
Hi Thomson, here is the link to that paper from Google DeepMind that I mentioned: https://arxiv.org/abs/2406.13843
Thank you Tom
A cookie is a small file of letters and numbers that we store on your browser or the hard drive of your computer if you agree. Cookies contain information that is transferred to your computer's hard drive.
These are cookies that are required for the operation of our website. These essential cookies are always enabled because our website won’t work properly without them. You can switch off these cookies in your browser settings but you may then not be able to access all or parts of our website.
These allow us to recognise and count the number of users and to see how users move around our website when they are using it. This helps us to improve the way our website works.