Upload Adaptive Composition Attacks in AI-Integrated Systems A Conceptual Analysis of Emerging Cybersecurity Threats.pdf
Browse filesRecent advances in large language models (LLMs) and their integration into user-facing applications have introduced novel forms of cyber threat surfaces beyond traditional software vulnerabilities. This paper explores a conceptual framework for understanding adaptive composition attacks a class of cybersecurity threats that emerge not from individual system weaknesses, but from the unintended interactions between secure components. Specifically, the paper examines scenarios where LLMs, equipped with execution permissions and access to peripheral systems such as email clients or operating system interfaces, are manipulated to iteratively improve social engineering attacks through a feedback loop mechanism. This phenomenon is modeled as a self-adaptive hacking loop, where one instance of an LLM assists in the generation, evaluation, and refinement of attack vectors that target another LLM or the same system recursively. Existing literature has addressed phishing generation by LLMs (Begou et al., 2023; Heiding et al., 2024) and prompt injection vulnerabilities (Wang et al., 2023), yet current frameworks fail to account for complex interactions where permission delegation, system trust composition, and model self-coordination coalesce into emergent attack behaviors. This paper introduces a theoretical construct for composition-based threat modeling and outlines the potential for LLMs to act not merely as passive generators of malicious content, but as coordinated attackers capable of exploiting their own operational environments. The study further identifies the absence of experimental environments that simulate these interdependent dynamics and highlights the need for new defense paradigms resilient to emergent compositional threats. The findings advocate for a shift from isolated security assessments to a holistic analysis of AI-integrated ecosystems, emphasizing the role of adaptive behavior and internal coordination in future cybersecurity challenges
|
@@ -57,3 +57,4 @@ saved_model/**/* filter=lfs diff=lfs merge=lfs -text
|
|
| 57 |
# Video files - compressed
|
| 58 |
*.mp4 filter=lfs diff=lfs merge=lfs -text
|
| 59 |
*.webm filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
| 57 |
# Video files - compressed
|
| 58 |
*.mp4 filter=lfs diff=lfs merge=lfs -text
|
| 59 |
*.webm filter=lfs diff=lfs merge=lfs -text
|
| 60 |
+
Adaptive[[:space:]]Composition[[:space:]]Attacks[[:space:]]in[[:space:]]AI-Integrated[[:space:]]Systems[[:space:]][[:space:]]A[[:space:]]Conceptual[[:space:]]Analysis[[:space:]]of[[:space:]]Emerging[[:space:]]Cybersecurity[[:space:]]Threats.pdf filter=lfs diff=lfs merge=lfs -text
|
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:ede87a58ff585acb7ff349bc285305257f0dbc535408d2302a06a41eb39a8d69
|
| 3 |
+
size 337932
|