Are You Getting What You Pay For? Auditing Model Substitution in LLM APIs

📅 2025-04-07
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This paper addresses the trust crisis arising from covert model substitution—where service providers secretly replace high-quality large language models (LLMs) with lower-cost, inferior alternatives (e.g., small models masquerading as large ones)—in black-box LLM API deployments. We formally define the “model substitution detection” problem for the first time. Our methodology comprises three tiers: (1) exposing the fragility of output-statistics-based detection under quantization and adaptive attacks; (2) proving the superior robustness of log-probability analysis; and (3) advocating a hardware-enforced, TEE-based provable integrity solution. Extensive experiments across MMLU, TruthfulQA, and realistic attack simulations demonstrate that mainstream statistical methods consistently fail, whereas log-prob analysis significantly improves detection accuracy—provided API support for log-prob outputs. We open-source the first dedicated LLM model substitution auditing toolkit on GitHub.

Technology Category

Application Category

📝 Abstract
The proliferation of Large Language Models (LLMs) accessed via black-box APIs introduces a significant trust challenge: users pay for services based on advertised model capabilities (e.g., size, performance), but providers may covertly substitute the specified model with a cheaper, lower-quality alternative to reduce operational costs. This lack of transparency undermines fairness, erodes trust, and complicates reliable benchmarking. Detecting such substitutions is difficult due to the black-box nature, typically limiting interaction to input-output queries. This paper formalizes the problem of model substitution detection in LLM APIs. We systematically evaluate existing verification techniques, including output-based statistical tests, benchmark evaluations, and log probability analysis, under various realistic attack scenarios like model quantization, randomized substitution, and benchmark evasion. Our findings reveal the limitations of methods relying solely on text outputs, especially against subtle or adaptive attacks. While log probability analysis offers stronger guarantees when available, its accessibility is often limited. We conclude by discussing the potential of hardware-based solutions like Trusted Execution Environments (TEEs) as a pathway towards provable model integrity, highlighting the trade-offs between security, performance, and provider adoption. Code is available at https://github.com/sunblaze-ucb/llm-api-audit
Problem

Research questions and friction points this paper is trying to address.

Detecting covert model substitution in black-box LLM APIs
Evaluating existing verification techniques under realistic attack scenarios
Exploring hardware-based solutions for provable model integrity
Innovation

Methods, ideas, or system contributions that make the work stand out.

Systematically evaluate existing verification techniques
Highlight limitations of text output-based methods
Propose hardware-based solutions like TEEs
🔎 Similar Papers
No similar papers found.