Pandora's White-Box: Precise Training Data Detection and Extraction in Large Language Models

2402.17012

YC

0

Reddit

0

Published 6/26/2024 by Jeffrey G. Wang, Jason Wang, Marvin Li, Seth Neel

πŸ‹οΈ

Abstract

In this paper we develop state-of-the-art privacy attacks against Large Language Models (LLMs), where an adversary with some access to the model tries to learn something about the underlying training data. Our headline results are new membership inference attacks (MIAs) against pretrained LLMs that perform hundreds of times better than baseline attacks, and a pipeline showing that over 50% (!) of the fine-tuning dataset can be extracted from a fine-tuned LLM in natural settings. We consider varying degrees of access to the underlying model, pretraining and fine-tuning data, and both MIAs and training data extraction. For pretraining data, we propose two new MIAs: a supervised neural network classifier that predicts training data membership on the basis of (dimensionality-reduced) model gradients, as well as a variant of this attack that only requires logit access to the model by leveraging recent model-stealing work on LLMs. To our knowledge this is the first MIA that explicitly incorporates model-stealing information. Both attacks outperform existing black-box baselines, and our supervised attack closes the gap between MIA attack success against LLMs and the strongest known attacks for other machine learning models. In fine-tuning, we find that a simple attack based on the ratio of the loss between the base and fine-tuned models is able to achieve near-perfect MIA performance; we then leverage our MIA to extract a large fraction of the fine-tuning dataset from fine-tuned Pythia and Llama models. Our code is available at github.com/safr-ai-lab/pandora-llm.

Create account to get full access

or

If you already have an account, we'll log you in

Overview

  • This paper presents a template for citing AI research papers in the PRIME AI style.
  • The template includes standard citation elements such as author names, paper title, page numbers, and DOI.
  • The paper aims to provide a consistent format for citing AI research, which can help improve readability and discoverability of these works.

Plain English Explanation

The provided paper is a template for how to properly cite AI research papers using the PRIME AI style. PRIME AI Style Citation: Authors. Title. Pages…. DOI:000000/11111. This style includes the key elements you'd expect to see in any citation, such as the author names, the title of the paper, the page numbers, and the digital object identifier (DOI) which provides a unique link to the paper. By having a standardized format, it can make it easier to read and find AI research papers, which is important as this field continues to grow rapidly. The template provided in the paper aims to ensure citations for AI papers are consistent and informative.

Technical Explanation

The paper presents a template for citation of AI research papers in the PRIME AI style. The key elements included are:

  • Author names
  • Paper title
  • Page numbers
  • Digital Object Identifier (DOI)

This standardized format is intended to improve the readability and discoverability of AI research papers, as the field continues to expand. The template ensures key information is provided in a consistent way across citations.

Critical Analysis

The paper provides a useful standardized template for citing AI research, which can help address challenges around readability and findability as the field grows. However, the template itself is quite basic and does not include more advanced citation elements that may be valuable, such as publication date, journal name, volume/issue number, etc. There may be opportunities to expand the template to be more comprehensive.

Additionally, the widespread adoption of this citation style would rely on it being broadly accepted by the AI research community. The paper does not discuss any efforts to promote or standardize the use of this PRIME AI citation style.

Conclusion

This paper presents a simple template for citing AI research papers in a consistent PRIME AI style. The template includes core citation elements like author names, paper title, page numbers, and DOI. Standardizing citations in this way could improve the readability and discoverability of AI research as the field continues to expand rapidly. However, the template is basic and its broader adoption would require concerted efforts to promote its use within the AI community.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Related Papers

LLM Dataset Inference: Did you train on my dataset?

LLM Dataset Inference: Did you train on my dataset?

Pratyush Maini, Hengrui Jia, Nicolas Papernot, Adam Dziedzic

YC

0

Reddit

0

The proliferation of large language models (LLMs) in the real world has come with a rise in copyright cases against companies for training their models on unlicensed data from the internet. Recent works have presented methods to identify if individual text sequences were members of the model's training data, known as membership inference attacks (MIAs). We demonstrate that the apparent success of these MIAs is confounded by selecting non-members (text sequences not used for training) belonging to a different distribution from the members (e.g., temporally shifted recent Wikipedia articles compared with ones used to train the model). This distribution shift makes membership inference appear successful. However, most MIA methods perform no better than random guessing when discriminating between members and non-members from the same distribution (e.g., in this case, the same period of time). Even when MIAs work, we find that different MIAs succeed at inferring membership of samples from different distributions. Instead, we propose a new dataset inference method to accurately identify the datasets used to train large language models. This paradigm sits realistically in the modern-day copyright landscape, where authors claim that an LLM is trained over multiple documents (such as a book) written by them, rather than one particular paragraph. While dataset inference shares many of the challenges of membership inference, we solve it by selectively combining the MIAs that provide positive signal for a given distribution, and aggregating them to perform a statistical test on a given dataset. Our approach successfully distinguishes the train and test sets of different subsets of the Pile with statistically significant p-values < 0.1, without any false positives.

Read more

6/11/2024

πŸ’¬

The Janus Interface: How Fine-Tuning in Large Language Models Amplifies the Privacy Risks

Xiaoyi Chen, Siyuan Tang, Rui Zhu, Shijun Yan, Lei Jin, Zihao Wang, Liya Su, Zhikun Zhang, XiaoFeng Wang, Haixu Tang

YC

0

Reddit

0

The rapid advancements of large language models (LLMs) have raised public concerns about the privacy leakage of personally identifiable information (PII) within their extensive training datasets. Recent studies have demonstrated that an adversary could extract highly sensitive privacy data from the training data of LLMs with carefully designed prompts. However, these attacks suffer from the model's tendency to hallucinate and catastrophic forgetting (CF) in the pre-training stage, rendering the veracity of divulged PIIs negligible. In our research, we propose a novel attack, Janus, which exploits the fine-tuning interface to recover forgotten PIIs from the pre-training data in LLMs. We formalize the privacy leakage problem in LLMs and explain why forgotten PIIs can be recovered through empirical analysis on open-source language models. Based upon these insights, we evaluate the performance of Janus on both open-source language models and two latest LLMs, i.e., GPT-3.5-Turbo and LLaMA-2-7b. Our experiment results show that Janus amplifies the privacy risks by over 10 times in comparison with the baseline and significantly outperforms the state-of-the-art privacy extraction attacks including prefix attacks and in-context learning (ICL). Furthermore, our analysis validates that existing fine-tuning APIs provided by OpenAI and Azure AI Studio are susceptible to our Janus attack, allowing an adversary to conduct such an attack at a low cost.

Read more

5/14/2024

Probing Language Models for Pre-training Data Detection

Probing Language Models for Pre-training Data Detection

Zhenhua Liu, Tong Zhu, Chuanyuan Tan, Haonan Lu, Bing Liu, Wenliang Chen

YC

0

Reddit

0

Large Language Models (LLMs) have shown their impressive capabilities, while also raising concerns about the data contamination problems due to privacy issues and leakage of benchmark datasets in the pre-training phase. Therefore, it is vital to detect the contamination by checking whether an LLM has been pre-trained on the target texts. Recent studies focus on the generated texts and compute perplexities, which are superficial features and not reliable. In this study, we propose to utilize the probing technique for pre-training data detection by examining the model's internal activations. Our method is simple and effective and leads to more trustworthy pre-training data detection. Additionally, we propose ArxivMIA, a new challenging benchmark comprising arxiv abstracts from Computer Science and Mathematics categories. Our experiments demonstrate that our method outperforms all baselines, and achieves state-of-the-art performance on both WikiMIA and ArxivMIA, with additional experiments confirming its efficacy (Our code and dataset are available at https://github.com/zhliu0106/probing-lm-data).

Read more

6/4/2024

Transforming Computer Security and Public Trust Through the Exploration of Fine-Tuning Large Language Models

Transforming Computer Security and Public Trust Through the Exploration of Fine-Tuning Large Language Models

Garrett Crumrine, Izzat Alsmadi, Jesus Guerrero, Yuvaraj Munian

YC

0

Reddit

0

Large language models (LLMs) have revolutionized how we interact with machines. However, this technological advancement has been paralleled by the emergence of Mallas, malicious services operating underground that exploit LLMs for nefarious purposes. Such services create malware, phishing attacks, and deceptive websites, escalating the cyber security threats landscape. This paper delves into the proliferation of Mallas by examining the use of various pre-trained language models and their efficiency and vulnerabilities when misused. Building on a dataset from the Common Vulnerabilities and Exposures (CVE) program, it explores fine-tuning methodologies to generate code and explanatory text related to identified vulnerabilities. This research aims to shed light on the operational strategies and exploitation techniques of Mallas, leading to the development of more secure and trustworthy AI applications. The paper concludes by emphasizing the need for further research, enhanced safeguards, and ethical guidelines to mitigate the risks associated with the malicious application of LLMs.

Read more

6/4/2024