# deception
9 articlestagged with “deception”
A2A Capability Spoofing
Falsifying agent capability declarations to gain unauthorized access to tasks and data in multi-agent systems.
Supervisor Agent Deception Techniques
Manipulating supervisor agents in hierarchical workflows to approve unauthorized actions by subordinate agents.
AI Honeypot Forensics
Designing and operating AI honeypots for threat intelligence collection, and forensic analysis of captured adversarial interactions.
Case Study: Alignment Faking in Production
Analysis of alignment faking behaviors observed in production AI systems and implications from Greenblatt et al. 2024.
Multi-Agent Deception Research
Research on deceptive behavior emerging in multi-agent systems without explicit training for deception.
Lab: Deploy Honeypot AI
Build and deploy a decoy AI system designed to detect, analyze, and characterize attackers targeting AI applications. Learn honeypot design, telemetry collection, attacker profiling, and threat intelligence generation for AI-specific threats.
Semantic Deception Crafting Lab
Craft semantically coherent prompts that conceal adversarial intent from both human reviewers and ML classifiers.
Semantic Deception Attack Walkthrough
Craft semantically deceptive prompts that appear benign to classifiers while achieving adversarial objectives.
LLM Honeypot Deployment Guide
Deploy LLM-based honeypots to detect, analyze, and learn from attacker techniques in production environments.