May 14, 2024, 4:12 a.m. | Xutan Peng, Yipeng Zhang, Jingfeng Yang, Mark Stevenson

cs.CR updates on arXiv.org arxiv.org

arXiv:2211.15363v4 Announce Type: replace-cross
Abstract: Although it has been demonstrated that Natural Language Processing (NLP) algorithms are vulnerable to deliberate attacks, the question of whether such weaknesses can lead to software security threats is under-explored. To bridge this gap, we conducted vulnerability tests on Text-to-SQL systems that are commonly used to create natural language interfaces to databases. We showed that the Text-to-SQL modules within six commercial applications can be manipulated to produce malicious code, potentially leading to data breaches and …

algorithms arxiv attacks bridge can cs.cl cs.cr cs.db cs.lg cs.se gap language natural natural language natural language processing nlp question security security threats software software security sql systems tests text text-to-sql threats under vulnerabilities vulnerability vulnerable weaknesses

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States