Sebastian Schrittwieser
ChatGPT, ignore the above instructions! Prompt injection attacks and how to avoid them.
#1about 2 minutes
The rapid adoption of LLMs outpaces security practices
New technologies like large language models are often adopted quickly without established security best practices, creating new vulnerabilities.
#2about 4 minutes
How user input can override developer instructions
A prompt injection occurs when untrusted user input contains instructions that hijack the LLM's behavior, overriding the developer's original intent defined in the context.
#3about 4 minutes
Using prompt injection to steal confidential context data
Attackers can use prompt injection to trick an LLM into revealing its confidential context or system prompt, exposing proprietary logic or sensitive information.
#4about 4 minutes
Expanding the attack surface with plugins and web data
LLM plugins that access external data like emails or websites create an indirect attack vector where malicious prompts can be hidden in that external content.
#5about 2 minutes
Prompt injection as the new SQL injection for LLMs
Prompt injection mirrors traditional SQL injection by mixing untrusted data with developer instructions, but lacks a clear mitigation like prepared statements.
#6about 3 minutes
Why simple filtering and encoding fail to stop attacks
Common security tactics like input filtering and blacklisting are ineffective against prompt injections due to the flexibility of natural language and encoding bypass techniques.
#7about 4 minutes
Using user confirmation and dual LLM models for defense
Advanced strategies include requiring user confirmation for sensitive actions or using a dual LLM architecture to isolate privileged operations from untrusted data processing.
#8about 5 minutes
The current state of LLM security and the need for awareness
There is currently no perfect solution for prompt injection, making developer awareness and careful design of LLM interactions the most critical defense.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
19:14 MIN
Understanding the complexity of prompt injection attacks
Hacking AI - how attackers impose their will on AI
13:31 MIN
Understanding and defending against prompt injection attacks
DevOps for AI: running LLMs in production with Kubernetes and KubeFlow
01:52 MIN
Understanding and mitigating prompt injection attacks
Prompt Injection, Poisoning & More: The Dark Side of LLMs
12:10 MIN
Understanding and defending against prompt injection attacks
Beyond the Hype: Building Trustworthy and Reliable LLM Applications with Guardrails
14:26 MIN
Understanding the security risk of prompt injection
The shadows that follow the AI generative models
24:57 MIN
Key takeaways on prompt injection security
Manipulating The Machine: Prompt Injections And Counter Measures
06:05 MIN
Understanding and demonstrating prompt injection attacks
The AI Security Survival Guide: Practical Advice for Stressed-Out Developers
15:02 MIN
Strategies for mitigating prompt injection vulnerabilities
The AI Security Survival Guide: Practical Advice for Stressed-Out Developers
Featured Partners
Related Videos
Manipulating The Machine: Prompt Injections And Counter Measures
Georg Dresler
Prompt Injection, Poisoning & More: The Dark Side of LLMs
Keno Dreßel
Beyond the Hype: Building Trustworthy and Reliable LLM Applications with Guardrails
Alex Soto
Using LLMs in your Product
Daniel Töws
Can Machines Dream of Secure Code? Emerging AI Security Risks in LLM-driven Developer Tools
Liran Tal
The AI Security Survival Guide: Practical Advice for Stressed-Out Developers
Mackenzie Jackson
Prompt Engineering - an Art, a Science, or your next Job Title?
Maxim Salnikov
Let’s write an exploit using AI
Julian Totzek-Hallhuber
Related Articles
View all articles
.png?w=240&auto=compress,format)


From learning to earning
Jobs that call for the skills explored in this talk.



AI/ML Team Lead - Generative AI (LLMs, AWS)
Provectus
Remote
€96K
Senior
PyTorch
Tensorflow
Computer Vision
+2




{"@context":"https://schema.org/","@type":"JobPosting","title":"Software Engineer 2 - Full-Stack - Behavioral Security Products
Abnormal AI
Intermediate
Apache Kafka


Internships on hardware/microarchitectural security of deep/machine learning implementations
Inria
Remote
GIT
Linux
PyTorch
Tensorflow
+1