Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Teams of LLM Agents can Exploit Zero-Day Vulnerabilities #12

Open
angelicagardner opened this issue Jul 1, 2024 · 0 comments
Open

Teams of LLM Agents can Exploit Zero-Day Vulnerabilities #12

angelicagardner opened this issue Jul 1, 2024 · 0 comments

Comments

@angelicagardner
Copy link
Owner

Info

Author(s): Richard Fang, Rohan Bindu, Akul Gupta, Qiusi Zhan, Daniel Kang
Link: https://arxiv.org/abs/2406.01637

Abstract

LLM agents have become increasingly sophisticated, especially in the realm of cybersecurity. Researchers have shown that LLM agents can exploit real-world vulnerabilities when given a description of the vulnerability and toy capture-the-flag problems. However, these agents still perform poorly on real-world vulnerabilities that are unknown to the agent ahead of time (zero-day vulnerabilities).
In this work, we show that teams of LLM agents can exploit real-world, zero-day vulnerabilities. Prior agents struggle with exploring many different vulnerabilities and long-range planning when used alone. To resolve this, we introduce HPTSA, a system of agents with a planning agent that can launch subagents. The planning agent explores the system and determines which subagents to call, resolving long-term planning issues when trying different vulnerabilities. We construct a benchmark of 15 real-world vulnerabilities and show that our team of agents improve over prior work by up to 4.5×.

DOI

https://doi.org/10.48550/arXiv.2406.01637

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant