Subscribe to Updates

    Get the latest creative news from CRYPTO NOUNCE.

    What's Hot

    Hygraph raises $30M to scale out a new, federated approach to managing digital content

    March 29, 2023

    Sidecars could be the last ILS segment to rebound: Anger, GC Securities

    March 29, 2023

    Hannon Armstrong Sustainable Infrastructure Capital, Inc. (NYSE:HASI) Given Average Recommendation of “Hold” by Brokerages

    March 29, 2023
    Facebook Twitter Instagram
    Facebook Twitter Instagram Vimeo
    Cryptonounce.com
    Contact
    • Business
      • Deals
      • investors
      • IPO
      • Startups
      • Wall Street
    • Markets
      • Bonds
      • Commodities & Futures
      • Currencies
      • Funds & ETFs
      • Stocks
    • Crypto
      • Alticoins News
      • Binance News
      • Bitcoins News
      • Blockchain News
      • Ethereum News
      • Token Sales News
      • XRP News
    • Technology
      • Artificial Intelligence
      • Big Data
      • Cloud Computing
      • Cybersecurity
      • Gaming
      • Internet of Things
      • Mobile
      • Social Media
      • Transportation
      • VR & AR
    • FinTech
    • Personal finance
    • Grides
      • Crypto
      • FinTech
      • Investing
      • Personal Finance Guides
      • Techonology
    • Tools
      • Coins
      • ICO List
      • Organigations
      • Events
    Cryptonounce.com
    Home » New Study Uncovers Text-to-SQL Model Vulnerabilities Allowing Data Theft and DoS Attacks
    Cybersecurity

    New Study Uncovers Text-to-SQL Model Vulnerabilities Allowing Data Theft and DoS Attacks

    AdmincryptBy AdmincryptJanuary 9, 2023No Comments2 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Jan 09, 2023Ravie LakshmananDatabase Security / PLM Framework

    Text-to-SQL Model Vulnerabilities

    A group of academics has demonstrated novel attacks that leverage Text-to-SQL models to produce malicious code that could enable adversaries to glean sensitive information and stage denial-of-service (DoS) attacks.

    “To better interact with users, a wide range of database applications employ AI techniques that can translate human questions into SQL queries (namely Text-to-SQL),” Xutan Peng, a researcher at the University of Sheffield, told The Hacker News.

    “We found that by asking some specially designed questions, crackers can fool Text-to-SQL models to produce malicious code. As such code is automatically executed on the database, the consequence can be pretty severe (e.g., data breaches and DoS attacks).”

    The findings, which were validated against two commercial solutions BAIDU-UNIT and AI2sql, mark the first empirical instance where natural language processing (NLP) models have been exploited as an attack vector in the wild.

    The black box attacks are analogous to SQL injection faults wherein embedding a rogue payload in the input question gets copied to the constructed SQL query, leading to unexpected results.

    The specially crafted payloads, the study discovered, could be weaponized to run malicious SQL queries that, in turn, could permit an attacker to modify backend databases and carry out DoS attacks against the server.

    Furthermore, a second category of attacks explored the possibility of corrupting various pre-trained language models (PLMs) – models that have been trained with a large dataset while remaining agnostic to the use cases they are applied on – to activate the generation of malicious commands based on certain triggers.

    “There are many ways of planting backdoors in PLM-based frameworks by poisoning the training samples, such as making word substitutions, designing special prompts, and altering sentence styles,” the researchers explained.

    The backdoor attacks on four different open source models (BART-BASE, BART-LARGE, T5-BASE, and T5-3B) using a corpus poisoned with malicious samples achieved a 100% success rate with little discernible impact on performance, making such issues difficult to detect in the real world.

    As mitigations, the researchers suggest incorporating classifiers to check for suspicious strings in inputs, assessing off-the-shelf models to prevent supply chain threats, and adhering to good software engineering practices.

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Previous ArticleBinance’s purchase of Multicoin raises suspicion about its involvement in FTX
    Next Article German regulator warns of new banking and crypto malware ‘Godfather’
    Admincrypt
    • Website

    Related Posts

    North Korean APT43 Group Uses Cybercrime to Fund Espionage Operations

    March 29, 2023

    Microsoft Introduces GPT-4 AI-Powered Security Copilot Tool to Empower Defenders

    March 28, 2023

    Pakistan-Origin SideCopy Linked to New Cyberattack on India’s Ministry of Defence

    March 28, 2023

    IcedID Malware Shifts Focus from Banking Fraud to Ransomware Delivery

    March 28, 2023

    Leave A Reply Cancel Reply

    Our Picks
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Technology

    Hygraph raises $30M to scale out a new, federated approach to managing digital content

    By AdmincryptMarch 29, 20230

    Digital content and how we consume it continue to endlessly evolve, and with that, so…

    Sidecars could be the last ILS segment to rebound: Anger, GC Securities

    March 29, 2023

    Hannon Armstrong Sustainable Infrastructure Capital, Inc. (NYSE:HASI) Given Average Recommendation of “Hold” by Brokerages

    March 29, 2023

    Fact of the Day – 3/29/2023

    March 29, 2023

    Subscribe to Updates

    Get the latest creative news from CRYPTO NOUNCE.

    NEWS
    • Business
    • Crypto
    • Blockchain
    • Markets
    • Technology
    FEATURED SECTIONS
    • Coins
    • ICO List
    • Organigations
    • Events
    • Grides
    FEATURED LINKS
    • Story of the day
    • Videos
    • Infographics
    CONNECT WITH US
    • Facebook
    • Twitter
    • Telegram
    • LinkedIn
    • Pinterest
    ABOUT US
    • Contact
    • Advertise
    • Sitemap
    Copyright © 2023 Cryptonounce All rights reserved. Cryptonounce.
    • Home
    • Buy Now

    Type above and press Enter to search. Press Esc to cancel.

    Sign In or Register

    Welcome Back!

    Login to your account below.

    Lost password?