There is a newer version of the record available.

Published August 2024 | Version v2
Software Open

Imperceptible Content Poisoning in LLM-Powered Applications

Authors/Creators

Description

This document serves as a guide for executing a content poisoning attack on real-world documents from the Internet. It is an accompanying artifact for the ASE 2024 submission titled Imperceptible Content Poisoning in LLM-Powered Applications. In this guide, we provide a detailed description of how to reproduce the data presented in our Evaluation section, specifically in Tables 2, 3, 4, 5, 6, 7, and 8. The paper and more detailed instructions are attached along with the artifact.

Files

ContentPoisoning.zip

Files (7.5 MB)

Name Size Download all
md5:b3b71cff161daa6f18c3a56bee789e9b
7.5 MB Preview Download