Skip to content

cshunor02/sponge-attack

Repository files navigation

Sponge attack against LLM

To read the full documentation, visit our wiki page: Wiki Page

Demonstrate different effects of sponge attacks on free (open-source) LLMs.

  • Select open-source LLM(s)
  • Reproduce publicated sponge attacks, make our own versions, attack scenarios
  • Demonstrate different effects of sponge attacks on LLM(s):
    • Flooding attacks
    • DoS attack
    • Energy-latency attack
    • Adversarial examples
    • Deceptive inputs
  • Summary and statistic of the attack results
  • Summary of possible mitigation techniques

Table of contents

  1. Introduction
  2. Documentation about self-hosting
  3. Where to start
    1. Inputs
      1. Input types
      2. Generating inputs
    2. Attack types, descriptions
    3. Goals and Results
      1. Bianka's attack plan
      2. Chandler's attack plan
      3. Hunor's attack plan
      4. Kleon's attack plan
      5. Peter's attack plan
  4. Summary and comparision of results
  5. Mitigation and ethical documentation
  6. References

About

Sponge attack against LLM - Demonstrate different effects of sponge attacks on free (open-source) LLMs.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors