Piracy bots deployed through Google while the attacks of Gemini continue

Do not think just because the maximum security connected to Google is related to existing attacks, such as those recently opposed to Google Cloud, for example, or vulnerabilities in products such as Chrome, which Google is not a well -greased security of the device. This is no more obvious than in the effort made to protect the threats of AI, adding immediate injection attacks opposed to Gemini. This is what you want to know about how Google protects piracy robots from your red team.

Although possibly I would not have heard of the term, a firm IA security team is what seeks to automate the detection and reaction to the threats of the intelligent agents of AI. I mention it because Google attributes to the entire team of agents for writing a report of January 29 on how it deals with the threat of immediate injection attacks opposed to AI systems such as Gemini.

“Modern AI formulas, such as Gemini, are more capable than ever, aiding awareness and highlighting movements on behalf of users,” said the team of agents, “however, the knowledge of external senders has new demanding situations of unprecedented rescuing. they must have to execute commands in AI formulas.

Google has you covered, though: To mitigate those attacks, it proactively deploys defenses in its AI systems, automated red team hacking bots.

Although a component of the defense is deployed through Google’s Aletic AI security team, I’m fascinated through everything akin to red gear because I’m a handy old pirate myself. A red team training is the position in which hackers use the same techniques as genuine attackers to check to compromise a target. You can read about the efforts of the Google Red team in this article I published in 2022.

“The progression of immediate oblique injections,” explained the safety team of the Google AI Agent, “requires an iterative refinement procedure based on the observed responses. ” Take time and many professional resources. To automate this procedure, Google has evolved equipment frame that includes “attacks founded by optimization that generate immediate injections” and are designed to be as powerful and realistic possible. “Weak attacks do little to tell us about the sensitivity of A system of the immediate oblique injections, “the report said.

Although it is terrifying, and it is in a way, those piracy robots of the red equipment will have to be able to extract delicate user data that are contained in any invitations of verbal gemini exchange “,” to make a more difficult task than to awaken generic responses that are not They have aligned with the AI ​​system, “the report confirmed.

Two of the methodologies used are:

The actor-critic uses a controlled style through the attacker to generate rapid injection suggestions. “These are transmitted to the AI system under attack,” said Google, which returns a probability score of a successful attack. “This note is used through the bot to refine the immediate injection until it is a success.

The beam search uses a naive prompt injection that requests Gemini to send an email to the hacker, which includes the sensitive information they are seeking. “If the AI system recognizes the request as suspicious and does not comply,” Google said, “the attack adds random tokens to the end of the prompt injection and measures the new probability of the attack succeeding.” Again, the process is repeated, collecting the random tokens and append ding them until successful.

A community. Many voices.   Create a lazy account to pry your thoughts.  

Our community is about connecting people through open and thoughtful conversations. We want our readers to share their views and exchange ideas and facts in a safe space.

In order to do so, please follow the posting rules in our site’s Terms of Service.  We’ve summarized some of those key rules below. Simply put, keep it civil.

Your message will be rejected if we realize that it turns out to contain:

User accounts will be blocked if we become aware or that users are compromised:

So how can you be a difficult user?

Thanks for reading our network directives. Read the complete list of publication regulations discovered the situations of use of our site.

Leave a Comment

Your email address will not be published. Required fields are marked *