all InfoSec news
On the Security Vulnerabilities of Text-to-SQL Models
May 14, 2024, 4:12 a.m. | Xutan Peng, Yipeng Zhang, Jingfeng Yang, Mark Stevenson
cs.CR updates on arXiv.org arxiv.org
Abstract: Although it has been demonstrated that Natural Language Processing (NLP) algorithms are vulnerable to deliberate attacks, the question of whether such weaknesses can lead to software security threats is under-explored. To bridge this gap, we conducted vulnerability tests on Text-to-SQL systems that are commonly used to create natural language interfaces to databases. We showed that the Text-to-SQL modules within six commercial applications can be manipulated to produce malicious code, potentially leading to data breaches and …
algorithms arxiv attacks bridge can cs.cl cs.cr cs.db cs.lg cs.se gap language natural natural language natural language processing nlp question security security threats software software security sql systems tests text text-to-sql threats under vulnerabilities vulnerability vulnerable weaknesses
More from arxiv.org / cs.CR updates on arXiv.org
Proactive Detection of Voice Cloning with Localized Watermarking
2 days, 23 hours ago |
arxiv.org
NFT Wash Trading: Direct vs. Indirect Estimation
2 days, 23 hours ago |
arxiv.org
Backdoor Attack with Sparse and Invisible Trigger
2 days, 23 hours ago |
arxiv.org
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Senior Security Researcher - Linux MacOS EDR (Cortex)
@ Palo Alto Networks | Tel Aviv-Yafo, Israel
Sr. Manager, NetSec GTM Programs
@ Palo Alto Networks | Santa Clara, CA, United States
SOC Analyst I
@ Fortress Security Risk Management | Cleveland, OH, United States