Skip to main content

Showing 1–15 of 15 results for author: Vero, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.23786  [pdf, ps, other

    cs.CR cs.AI cs.LG

    Mind the Gap: A Practical Attack on GGUF Quantization

    Authors: Kazuki Egashira, Robin Staab, Mark Vero, Jingxuan He, Martin Vechev

    Abstract: With the increasing size of frontier LLMs, post-training quantization has become the standard for memory-efficient deployment. Recent work has shown that basic rounding-based quantization schemes pose security risks, as they can be exploited to inject malicious behaviors into quantized models that remain hidden in full precision. However, existing attacks cannot be applied to more complex quantiza… ▽ More

    Submitted 3 June, 2025; v1 submitted 24 May, 2025; originally announced May 2025.

    Comments: ICML 2025

  2. arXiv:2505.16567  [pdf, other

    cs.LG cs.AI cs.CR

    Finetuning-Activated Backdoors in LLMs

    Authors: Thibaud Gloaguen, Mark Vero, Robin Staab, Martin Vechev

    Abstract: Finetuning openly accessible Large Language Models (LLMs) has become standard practice for achieving task-specific performance improvements. Until now, finetuning has been regarded as a controlled and secure process in which training on benign datasets led to predictable behaviors. In this paper, we demonstrate for the first time that an adversary can create poisoned LLMs that initially appear ben… ▽ More

    Submitted 23 May, 2025; v1 submitted 22 May, 2025; originally announced May 2025.

  3. arXiv:2502.11844  [pdf, ps, other

    cs.CR cs.AI cs.LG cs.PL

    BaxBench: Can LLMs Generate Correct and Secure Backends?

    Authors: Mark Vero, Niels Mündler, Victor Chibotaru, Veselin Raychev, Maximilian Baader, Nikola Jovanović, Jingxuan He, Martin Vechev

    Abstract: Automatic program generation has long been a fundamental challenge in computer science. Recent benchmarks have shown that large language models (LLMs) can effectively generate code at the function level, make code edits, and solve algorithmic coding tasks. However, to achieve full automation, LLMs should be able to generate production-quality, self-contained application modules. To evaluate the ca… ▽ More

    Submitted 30 May, 2025; v1 submitted 17 February, 2025; originally announced February 2025.

  4. arXiv:2410.07959  [pdf, other

    cs.CL cs.AI cs.CY cs.LG

    COMPL-AI Framework: A Technical Interpretation and LLM Benchmarking Suite for the EU Artificial Intelligence Act

    Authors: Philipp Guldimann, Alexander Spiridonov, Robin Staab, Nikola Jovanović, Mark Vero, Velko Vechev, Anna-Maria Gueorguieva, Mislav Balunović, Nikola Konstantinov, Pavol Bielik, Petar Tsankov, Martin Vechev

    Abstract: The EU's Artificial Intelligence Act (AI Act) is a significant step towards responsible AI development, but lacks clear technical interpretation, making it difficult to assess models' compliance. This work presents COMPL-AI, a comprehensive framework consisting of (i) the first technical interpretation of the EU AI Act, translating its broad regulatory requirements into measurable technical requir… ▽ More

    Submitted 3 February, 2025; v1 submitted 10 October, 2024; originally announced October 2024.

  5. arXiv:2408.02509  [pdf, ps, other

    cs.CR cs.LG cs.PL cs.SE

    Black-Box Adversarial Attacks on LLM-Based Code Completion

    Authors: Slobodan Jenko, Niels Mündler, Jingxuan He, Mark Vero, Martin Vechev

    Abstract: Modern code completion engines, powered by large language models (LLMs), assist millions of developers with their strong capabilities to generate functionally correct code. Due to this popularity, it is crucial to investigate the security implications of relying on LLM-based code completion. In this work, we demonstrate that state-of-the-art black-box LLM-based code completion engines can be steal… ▽ More

    Submitted 13 June, 2025; v1 submitted 5 August, 2024; originally announced August 2024.

  6. arXiv:2406.07217  [pdf, other

    cs.LG cs.AI cs.CL

    A Synthetic Dataset for Personal Attribute Inference

    Authors: Hanna Yukhymenko, Robin Staab, Mark Vero, Martin Vechev

    Abstract: Recently, powerful Large Language Models (LLMs) have become easily accessible to hundreds of millions of users world-wide. However, their strong capabilities and vast world knowledge do not come without associated privacy risks. In this work, we focus on the emerging privacy threat LLMs pose -- the ability to accurately infer personal information from online texts. Despite the growing importance o… ▽ More

    Submitted 4 November, 2024; v1 submitted 11 June, 2024; originally announced June 2024.

  7. arXiv:2405.18161  [pdf, other

    cs.LG cs.AI

    Back to the Drawing Board for Fair Representation Learning

    Authors: Angéline Pouget, Nikola Jovanović, Mark Vero, Robin Staab, Martin Vechev

    Abstract: The goal of Fair Representation Learning (FRL) is to mitigate biases in machine learning models by learning data representations that enable high accuracy on downstream tasks while minimizing discrimination based on sensitive attributes. The evaluation of FRL methods in many recent works primarily focuses on the tradeoff between downstream fairness and accuracy with respect to a single task that w… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

  8. arXiv:2405.18137  [pdf, other

    cs.LG cs.AI cs.CR

    Exploiting LLM Quantization

    Authors: Kazuki Egashira, Mark Vero, Robin Staab, Jingxuan He, Martin Vechev

    Abstract: Quantization leverages lower-precision weights to reduce the memory usage of large language models (LLMs) and is a key technique for enabling their deployment on commodity hardware. While LLM quantization's impact on utility has been extensively explored, this work for the first time studies its adverse effects from a security perspective. We reveal that widely used quantization methods can be exp… ▽ More

    Submitted 4 November, 2024; v1 submitted 28 May, 2024; originally announced May 2024.

  9. arXiv:2404.10618  [pdf, other

    cs.AI cs.CV cs.LG

    Private Attribute Inference from Images with Vision-Language Models

    Authors: Batuhan Tömekçe, Mark Vero, Robin Staab, Martin Vechev

    Abstract: As large language models (LLMs) become ubiquitous in our daily tasks and digital interactions, associated privacy risks are increasingly in focus. While LLM privacy research has primarily focused on the leakage of model training data, it has recently been shown that LLMs can make accurate privacy-infringing inferences from previously unseen texts. With the rise of vision-language models (VLMs), ca… ▽ More

    Submitted 4 November, 2024; v1 submitted 16 April, 2024; originally announced April 2024.

  10. arXiv:2402.13846  [pdf, other

    cs.AI cs.CL cs.CR

    Large Language Models are Advanced Anonymizers

    Authors: Robin Staab, Mark Vero, Mislav Balunović, Martin Vechev

    Abstract: Recent privacy research on large language models (LLMs) has shown that they achieve near-human-level performance at inferring personal data from online texts. With ever-increasing model capabilities, existing text anonymization methods are currently lacking behind regulatory requirements and adversarial threats. In this work, we take two steps to bridge this gap: First, we present a new setting fo… ▽ More

    Submitted 3 February, 2025; v1 submitted 21 February, 2024; originally announced February 2024.

    Comments: International Conference on Learning Representations (ICLR 2024)

    ACM Class: I.2.7

  11. arXiv:2402.09497  [pdf, other

    cs.CR cs.AI cs.LG cs.SE

    Instruction Tuning for Secure Code Generation

    Authors: Jingxuan He, Mark Vero, Gabriela Krasnopolska, Martin Vechev

    Abstract: Modern language models (LMs) have gained widespread acceptance in everyday and professional contexts, particularly in programming. An essential procedure enabling this adoption is instruction tuning, which substantially enhances LMs' practical utility by training them to follow user instructions and human preferences. However, existing instruction tuning schemes overlook a crucial aspect: the secu… ▽ More

    Submitted 12 July, 2024; v1 submitted 14 February, 2024; originally announced February 2024.

  12. arXiv:2310.07298  [pdf, other

    cs.AI cs.LG

    Beyond Memorization: Violating Privacy Via Inference with Large Language Models

    Authors: Robin Staab, Mark Vero, Mislav Balunović, Martin Vechev

    Abstract: Current privacy research on large language models (LLMs) primarily focuses on the issue of extracting memorized training data. At the same time, models' inference capabilities have increased drastically. This raises the key question of whether current LLMs could violate individuals' privacy by inferring personal attributes from text given at inference time. In this work, we present the first compr… ▽ More

    Submitted 6 May, 2024; v1 submitted 11 October, 2023; originally announced October 2023.

    ACM Class: I.2.7

  13. arXiv:2307.03577  [pdf, other

    cs.LG cs.DB cs.PL

    CuTS: Customizable Tabular Synthetic Data Generation

    Authors: Mark Vero, Mislav Balunović, Martin Vechev

    Abstract: Privacy, data quality, and data sharing concerns pose a key limitation for tabular data applications. While generating synthetic data resembling the original distribution addresses some of these issues, most applications would benefit from additional customization on the generated data. However, existing synthetic data approaches are limited to particular constraints, e.g., differential privacy (D… ▽ More

    Submitted 2 June, 2024; v1 submitted 7 July, 2023; originally announced July 2023.

  14. arXiv:2210.01785  [pdf, other

    cs.LG cs.CR cs.DC

    TabLeak: Tabular Data Leakage in Federated Learning

    Authors: Mark Vero, Mislav Balunović, Dimitar I. Dimitrov, Martin Vechev

    Abstract: While federated learning (FL) promises to preserve privacy, recent works in the image and text domains have shown that training updates leak private client data. However, most high-stakes applications of FL (e.g., in healthcare and finance) use tabular data, where the risk of data leakage has not yet been explored. A successful attack for tabular data must address two key challenges unique to the… ▽ More

    Submitted 7 July, 2023; v1 submitted 4 October, 2022; originally announced October 2022.

    ACM Class: I.2.11

  15. Reducing Neural Architecture Search Spaces with Training-Free Statistics and Computational Graph Clustering

    Authors: Thorir Mar Ingolfsson, Mark Vero, Xiaying Wang, Lorenzo Lamberti, Luca Benini, Matteo Spallanzani

    Abstract: The computational demands of neural architecture search (NAS) algorithms are usually directly proportional to the size of their target search spaces. Thus, limiting the search to high-quality subsets can greatly reduce the computational load of NAS algorithms. In this paper, we present Clustering-Based REDuction (C-BRED), a new technique to reduce the size of NAS search spaces. C-BRED reduces a NA… ▽ More

    Submitted 29 April, 2022; originally announced April 2022.

    ACM Class: I.m