Skip to main content

Showing 1–4 of 4 results for author: Labunets, A

Searching in archive cs. Search in all archives.
.
  1. Fun-tuning: Characterizing the Vulnerability of Proprietary LLMs to Optimization-based Prompt Injection Attacks via the Fine-Tuning Interface

    Authors: Andrey Labunets, Nishit V. Pandya, Ashish Hooda, Xiaohan Fu, Earlence Fernandes

    Abstract: We surface a new threat to closed-weight Large Language Models (LLMs) that enables an attacker to compute optimization-based prompt injections. Specifically, we characterize how an attacker can leverage the loss-like information returned from the remote fine-tuning interface to guide the search for adversarial prompts. The fine-tuning interface is hosted by an LLM vendor and allows developers to f… ▽ More

    Submitted 9 May, 2025; v1 submitted 16 January, 2025; originally announced January 2025.

    Journal ref: Proceedings of the 2025 IEEE Symposium on Security and Privacy, IEEE Computer Society, 2025, pp. 374-392

  2. arXiv:2403.02768  [pdf, other

    cs.CY

    An Empirical Analysis on the Use and Reporting of National Security Letters

    Authors: Alex Bellon, Miro Haller, Andrey Labunets, Enze Liu, Stefan Savage

    Abstract: Government investigatory and surveillance powers are important tools for examining crime and protecting public safety. However, since these tools must be employed in secret, it can be challenging to identify abuses or changes in use that could be of significant public interest. In this paper, we evaluate this phenomenon in the context of National Security Letters (NSLs). NSLs are a form of legal p… ▽ More

    Submitted 1 February, 2025; v1 submitted 5 March, 2024; originally announced March 2024.

  3. arXiv:2212.04107  [pdf, other

    cs.CR cs.CV

    Re-purposing Perceptual Hashing based Client Side Scanning for Physical Surveillance

    Authors: Ashish Hooda, Andrey Labunets, Tadayoshi Kohno, Earlence Fernandes

    Abstract: Content scanning systems employ perceptual hashing algorithms to scan user content for illegal material, such as child pornography or terrorist recruitment flyers. Perceptual hashing algorithms help determine whether two images are visually similar while preserving the privacy of the input images. Several efforts from industry and academia propose to conduct content scanning on client devices such… ▽ More

    Submitted 8 December, 2022; originally announced December 2022.

  4. arXiv:2207.06710  [pdf, other

    cs.CL

    Overview of Abusive and Threatening Language Detection in Urdu at FIRE 2021

    Authors: Maaz Amjad, Alisa Zhila, Grigori Sidorov, Andrey Labunets, Sabur Butta, Hamza Imam Amjad, Oxana Vitman, Alexander Gelbukh

    Abstract: With the growth of social media platform influence, the effect of their misuse becomes more and more impactful. The importance of automatic detection of threatening and abusive language can not be overestimated. However, most of the existing studies and state-of-the-art methods focus on English as the target language, with limited work on low- and medium-resource languages. In this paper, we prese… ▽ More

    Submitted 14 July, 2022; originally announced July 2022.