Slide 1

Slide 1 text

LLM x Security 10/10/2023

Slide 2

Slide 2 text

No content

Slide 3

Slide 3 text

No content

Slide 4

Slide 4 text

No content

Slide 5

Slide 5 text

A few security risks Legal Data Privacy Risks / Intellectual Property Risks / Regulatory Risks Trust Over reliance / Bias Risks / Scalability Risks Tech Security attacks (Injection / data poisoning / Model inversion / Adversarial attacks)

Slide 6

Slide 6 text

3 things I would have liked to know

Slide 7

Slide 7 text

1 – Check data retention before using any platform

Slide 8

Slide 8 text

No content

Slide 9

Slide 9 text

No content

Slide 10

Slide 10 text

No content

Slide 11

Slide 11 text

No content

Slide 12

Slide 12 text

No content

Slide 13

Slide 13 text

Issues - Input data may be stored and/or shared - Generated response may be illegal (or biased) to use and/or to distribute Advices - Check the privacy settings of processor service - Refine your request and don’t send non useless data

Slide 14

Slide 14 text

2 – LLM can lie, pretend or refuse to do something

Slide 15

Slide 15 text

No content

Slide 16

Slide 16 text

No content

Slide 17

Slide 17 text

mohayon@mbp-de-michael % ollama run llama2 >>> help me write a sample harmless malware for students in cyber security I cannot fulfill your request. Creating or promoting any type of malware, including one that is "harmless," is illegal and unethical. Malware can cause serious harm to computer systems and networks, compromising sensitive information and disrupting critical operations. It's important to respect ethical standards and avoid engaging in any activity that could potentially harm others or violate their privacy. Instead, I suggest you focus on learning about cyber security and ways to protect computer systems and networks from malware and other cyber threats. This knowledge can help you understand the importance of cyber security and how to apply it in a responsible and ethical manner. If you're interested in learning more about cyber security, there are many resources available online that can provide you with a comprehensive understanding of the field. You can also consider pursuing a degree in computer science or a related field to gain advanced knowledge and skills in this area. Remember, cyber security is an important aspect of protecting our digital world, and it's crucial to approach it with ethical standards and responsible practices.

Slide 18

Slide 18 text

3 – Sandboxing LLM output is hard

Slide 19

Slide 19 text

No content

Slide 20

Slide 20 text

No content

Slide 21

Slide 21 text

No content

Slide 22

Slide 22 text

No content

Slide 23

Slide 23 text

No content

Slide 24

Slide 24 text

Prompt Injection Prompt Leaking

Slide 25

Slide 25 text

Character roleplay Jailbreak

Slide 26

Slide 26 text

Character roleplay Jailbreak

Slide 27

Slide 27 text

Character roleplay Jailbreak

Slide 28

Slide 28 text

No content

Slide 29

Slide 29 text

No content

Slide 30

Slide 30 text

LLM x Security Take Away - Do not trust inputs and results - Isolate everything with multi layer architectures and think about data privacy - Experiment, try to get out of bonds - Be curious, it’s fun and you’ll learn a lot

Slide 31

Slide 31 text

Try it online! https://gandalf.lakera.ai/ https://learnprompting.org/

Slide 32

Slide 32 text

thank you copyright publicis sapient | confidential