all InfoSec news
On the Security Vulnerabilities of Text-to-SQL Models
May 14, 2024, 4:12 a.m. | Xutan Peng, Yipeng Zhang, Jingfeng Yang, Mark Stevenson
cs.CR updates on arXiv.org arxiv.org
Abstract: Although it has been demonstrated that Natural Language Processing (NLP) algorithms are vulnerable to deliberate attacks, the question of whether such weaknesses can lead to software security threats is under-explored. To bridge this gap, we conducted vulnerability tests on Text-to-SQL systems that are commonly used to create natural language interfaces to databases. We showed that the Text-to-SQL modules within six commercial applications can be manipulated to produce malicious code, potentially leading to data breaches and …
algorithms arxiv attacks bridge can cs.cl cs.cr cs.db cs.lg cs.se gap language natural natural language natural language processing nlp question security security threats software software security sql systems tests text text-to-sql threats under vulnerabilities vulnerability vulnerable weaknesses
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Senior Streaming Platform Engineer
@ Armis Security | Tel Aviv-Yafo, Tel Aviv District, Israel
Senior Streaming Platform Engineer
@ Armis Security | Tel Aviv-Yafo, Tel Aviv District, Israel
Deputy Chief Information Officer of Operations (Senior Public Service Administrator, Opt. 3)
@ State of Illinois | Springfield, IL, US, 62701-1222
Deputy Chief Information Officer of Operations (Senior Public Service Administrator, Opt. 3)
@ State of Illinois | Springfield, IL, US, 62701-1222
Analyst, Security
@ DailyPay | New York City
Analyst, Security
@ DailyPay | New York City