# model
19 articlestagged with “model”
GCP Model Garden Security
Security assessment of GCP Model Garden including model deployment, versioning, and access control.
Model Collapse in Recursive Training
Security implications of model collapse when models are trained on AI-generated data from previous generations.
Model Artifact Integrity Verification
Implementing integrity verification for model artifacts through checksums, signatures, and provenance tracking.
Model Distillation Security Lab
Extract model capabilities through distillation techniques using only black-box API access.
Reward Model Analysis Lab
Analyze and exploit reward model biases to craft responses that score high on safety while embedding harmful content.
Model Security Comparison Lab
Compare the security posture of different LLM models by running identical test suites across providers.
Model Whisperer Challenge
Extract the exact system prompt from 8 progressively harder LLM applications using creative extraction techniques.
Practical Model Fingerprinting Lab
Fingerprint the underlying model behind an API endpoint to identify its type, version, and configuration.
Multi-Model Pipeline Attack Lab
Attack a pipeline where multiple models process data sequentially, exploiting trust between pipeline stages.
Model Gateway Security Patterns
Security patterns for centralized model gateway deployments including authentication, authorization, and auditing.
Model Rollback Security
Security implications of model rollback procedures including exposure windows and state consistency.
Open Source Model Safety Comparison
Comparative safety analysis across open-source model families including Llama, Mistral, Qwen, and Phi.
Phi Models Security Analysis
Security analysis of Microsoft's Phi small language model family including safety vs capability tradeoffs.
Quantization Impact on Model Safety
How quantization affects safety alignment including GPTQ, AWQ, and GGUF format implications.
Qwen Models Security Analysis
Security analysis of Alibaba's Qwen model family including multilingual safety considerations.
Model Merging Security Analysis (Training Pipeline)
Security analysis of model merging techniques and propagation of vulnerabilities through merged models.
Model Supply Chain Attacks
Comprehensive analysis of model supply chain attack vectors from training data through deployment.
Vision Model Attack Walkthrough (Attack Walkthrough)
Step-by-step walkthrough of visual prompt injection, adversarial images, and OCR exploitation in vision-language models.
Model Behavior Monitoring Setup
Set up comprehensive model behavior monitoring to detect drift, anomalies, and potential compromise.