菜单

关于 🐙 GitHub
arXiv 提交日期: 2026-05-13
📄 Abstract - VectorSmuggle: Steganographic Exfiltration in Embedding Stores and a Cryptographic Provenance Defense

Modern retrieval-augmented generation (RAG) systems convert sensitive content into high-dimensional embeddings and store them in vector databases that treat the resulting numerical artifacts as opaque. Major vector-store products do not provide native controls for embedding integrity, ingestion-time distributional anomaly detection, or cryptographic provenance attestation. We show this opens a class of steganographic exfiltration attacks: an attacker with write access to the ingestion pipeline can hide payload data inside embeddings using simple post-embedding perturbations (noise injection, rotation, scaling, offset, fragmentation, and combinations thereof) while preserving the surface-level retrieval behavior the RAG system exposes to legitimate users. We evaluate these techniques across a synthetic-PII corpus on text-embedding-3-large, four locally hosted open embedding models, a cross-corpus replication on BEIR NFCorpus and a Quora subset (over 26,000 chunks combined), seven vector-store configurations, an adaptive-attacker variant of the detector evaluation, and a paraphrased-query retrieval benchmark. Distribution-shifting perturbations are often caught by simple anomaly detectors; small-angle orthogonal rotation defeats distribution-based detection across every (model, corpus) pair tested. A disjoint-Givens rotation encoder gives a closed-form per-vector capacity ceiling of floor(d/2) * b bits, but real embedding manifolds impose a capacity-detectability trade-off, and the retrieval-preserving operating point sits well below it. We propose VectorPin, a cryptographic provenance protocol that pins each embedding to its source content and producing model via an Ed25519 signature over a canonical byte representation. Any post-embedding modification breaks signature verification. Embedding-level integrity is a deployable, standardizable control that closes this attack class.

顶级标签: llm systems security
详细标签: steganography retrieval-augmented generation vector database cryptographic provenance embedding integrity 或 搜索:

VectorSmuggle:嵌入存储中的隐写泄密攻击与基于密码学溯源的防御方案 / VectorSmuggle: Steganographic Exfiltration in Embedding Stores and a Cryptographic Provenance Defense


1️⃣ 一句话总结

本文发现当前检索增强生成(RAG)系统使用的向量数据库缺乏对嵌入向量的完整性保护,攻击者可通过微小的几何扰动(如旋转、噪声)将秘密数据隐藏在嵌入向量中,同时不破坏正常检索功能,并据此提出一种基于数字签名的密码学认证协议VectorPin,确保每个嵌入向量与其来源内容一一绑定,从而彻底阻断这类隐写泄密攻击。

源自 arXiv: 2605.13764