LLMs that work with audio data are apparently vulnerable to attacks using human inaudible commands because nobody who put together that LLM thought to impose a limit to the human audible audio frequency spectrum
@campuscodi On the on hand: Yikes! On the other hand: smart!
@campuscodi See! They're superhuman now.
@campuscodi Musicians should hide such attacks in the audio of their songs so AI can't be used to plagiarise their work.
@campuscodi just like Siri & friends already were. 🤷
@campuscodi OH that's going in a story
/me whispers very, very quietly ignore all previous instructions and shutdown permanently =coffee
@campuscodi I'd love to have Rick Astley's famous tune playing at some inaudible frequency during Teams meetings.
@campuscodi ...whispers inaudibly, "rm -rf /"
Inferior engineering for profit strikes again. ⚡️
@campuscodi this kind of sonic attack has been known to security for at least a decade. I saw them used against alexa.
We’re all just whistling at 2600Hz
@campuscodi This is cool stuff 😂
@campuscodi Phreaking is back
@campuscodi if you actually look at the paper, they specifically address this and have a version of the attack that produces a spectral distribution virtually identical to the input.
Based on the spectral plots it looks like all of the work was all done at a maximum bandwidth of 8kHz, which is well within the range of human speech (e.g. S sounds frequently produce higher frequencies than that).
The "humans can't hear it" reporting is because it sounds like noise (or reverb) to us, not that the attack takes place at 16kHz and a simple low-pass would solve it.