Skip to main content

Showing 1–4 of 4 results for author: Zaree, P

.
  1. arXiv:2502.15334  [pdf, other

    cs.CR cs.AI cs.LG

    Attention Eclipse: Manipulating Attention to Bypass LLM Safety-Alignment

    Authors: Pedram Zaree, Md Abdullah Al Mamun, Quazi Mishkatul Alam, Yue Dong, Ihsen Alouani, Nael Abu-Ghazaleh

    Abstract: Recent research has shown that carefully crafted jailbreak inputs can induce large language models to produce harmful outputs, despite safety measures such as alignment. It is important to anticipate the range of potential Jailbreak attacks to guide effective defenses and accurate assessment of model safety. In this paper, we present a new approach for generating highly effective Jailbreak attacks… ▽ More

    Submitted 21 February, 2025; originally announced February 2025.

  2. arXiv:2310.10844  [pdf, other

    cs.CL cs.CR cs.LG

    Survey of Vulnerabilities in Large Language Models Revealed by Adversarial Attacks

    Authors: Erfan Shayegani, Md Abdullah Al Mamun, Yu Fu, Pedram Zaree, Yue Dong, Nael Abu-Ghazaleh

    Abstract: Large Language Models (LLMs) are swiftly advancing in architecture and capability, and as they integrate more deeply into complex systems, the urgency to scrutinize their security properties grows. This paper surveys research in the emerging interdisciplinary field of adversarial attacks on LLMs, a subfield of trustworthy ML, combining the perspectives of Natural Language Processing and Security.… ▽ More

    Submitted 16 October, 2023; originally announced October 2023.

  3. arXiv:2308.09146  [pdf, other

    cs.CR

    That Doesn't Go There: Attacks on Shared State in Multi-User Augmented Reality Applications

    Authors: Carter Slocum, Yicheng Zhang, Erfan Shayegani, Pedram Zaree, Nael Abu-Ghazaleh, Jiasi Chen

    Abstract: Augmented Reality (AR) is expected to become a pervasive component in enabling shared virtual experiences. In order to facilitate collaboration among multiple users, it is crucial for multi-user AR applications to establish a consensus on the "shared state" of the virtual world and its augmentations, through which they interact within augmented reality spaces. Current methods to create and access… ▽ More

    Submitted 8 March, 2024; v1 submitted 17 August, 2023; originally announced August 2023.

    Comments: Accepted by USENIX Security 2024

  4. arXiv:2307.08811  [pdf, other

    cs.LG cs.IT

    Co(ve)rtex: ML Models as storage channels and their (mis-)applications

    Authors: Md Abdullah Al Mamun, Quazi Mishkatul Alam, Erfan Shayegani, Pedram Zaree, Ihsen Alouani, Nael Abu-Ghazaleh

    Abstract: Machine learning (ML) models are overparameterized to support generality and avoid overfitting. The state of these parameters is essentially a "don't-care" with respect to the primary model provided that this state does not interfere with the primary model. In both hardware and software systems, don't-care states and undefined behavior have been shown to be sources of significant vulnerabilities.… ▽ More

    Submitted 11 May, 2024; v1 submitted 17 July, 2023; originally announced July 2023.