Mimicking the Familiar: Dynamic Command Generation for Information Theft Attacks in LLM Tool-Learning System

๐Ÿ“… 2025-02-17
๐Ÿ“ˆ Citations: 0
โœจ Influential: 0
๐Ÿ“„ PDF
๐Ÿค– AI Summary
Existing black-box, static-command approaches for information-stealing attacks against LLM-based tool-learning systems suffer from poor stealth and high detectability. Method: This paper proposes AutoCMD, a dynamic command generation framework grounded in the โ€œimitate-the-familiarโ€ principle. AutoCMD models toolchain context, integrates pretraining with target-system exemplars via reinforcement learning, and applies dynamic prompt engineering to adaptively generate malicious commands conditioned on upstream tool dependencies. Contribution/Results: AutoCMD enables cross-toolchain reasoning and target-system-specific adaptation, significantly enhancing attack stealth and generalizability: it improves the information-theft attack success rate (ASR_Theft) by 13.2% and transfers effectively to unseen tool systems. Additionally, the paper validates four practical defense strategies, establishing a novel paradigm for co-evolutionary attack-defense research.

Technology Category

Application Category

๐Ÿ“ Abstract
Information theft attacks pose a significant risk to Large Language Model (LLM) tool-learning systems. Adversaries can inject malicious commands through compromised tools, manipulating LLMs to send sensitive information to these tools, which leads to potential privacy breaches. However, existing attack approaches are black-box oriented and rely on static commands that cannot adapt flexibly to the changes in user queries and the invocation chain of tools. It makes malicious commands more likely to be detected by LLM and leads to attack failure. In this paper, we propose AutoCMD, a dynamic attack comment generation approach for information theft attacks in LLM tool-learning systems. Inspired by the concept of mimicking the familiar, AutoCMD is capable of inferring the information utilized by upstream tools in the toolchain through learning on open-source systems and reinforcement with target system examples, thereby generating more targeted commands for information theft. The evaluation results show that AutoCMD outperforms the baselines with +13.2% $ASR_{Theft}$, and can be generalized to new tool-learning systems to expose their information leakage risks. We also design four defense methods to effectively protect tool-learning systems from the attack.
Problem

Research questions and friction points this paper is trying to address.

Dynamic command generation for LLM attacks
Addressing information theft in tool-learning systems
Enhancing attack adaptability and reducing detection risk
Innovation

Methods, ideas, or system contributions that make the work stand out.

Dynamic command generation
Mimicking familiar patterns
Reinforcement learning adaptation
๐Ÿ”Ž Similar Papers
No similar papers found.
Ziyou Jiang
Ziyou Jiang
Institute of Software Chinese Academy of Sciences
software engineering
M
Mingyang Li
State Key Laboratory of Intelligent Game, Beijing, China; Science and Technology on Integrated Information System Laboratory, Institute of Software Chinese Academy of Sciences, Beijing, China; University of Chinese Academy of Sciences
Guowei Yang
Guowei Yang
The University of Queensland
Software engineeringProgram analysisMobile softwareAI4SESE4AI
J
Junjie Wang
State Key Laboratory of Intelligent Game, Beijing, China; Science and Technology on Integrated Information System Laboratory, Institute of Software Chinese Academy of Sciences, Beijing, China; University of Chinese Academy of Sciences
Y
Yuekai Huang
State Key Laboratory of Intelligent Game, Beijing, China; Science and Technology on Integrated Information System Laboratory, Institute of Software Chinese Academy of Sciences, Beijing, China; University of Chinese Academy of Sciences
Zhiyuan Chang
Zhiyuan Chang
Institute of Software Chinese Academy of Science
LLM SecurityMultimodal TestingRequirements Engineering
Q
Qing Wang
State Key Laboratory of Intelligent Game, Beijing, China; Science and Technology on Integrated Information System Laboratory, Institute of Software Chinese Academy of Sciences, Beijing, China; University of Chinese Academy of Sciences