ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2507.02844
5
0

Visual Contextual Attack: Jailbreaking MLLMs with Image-Driven Context Injection

3 July 2025
Ziqi Miao
Yi Ding
Lijun Li
Jing Shao
ArXiv (abs)PDFHTML
Main:7 Pages
3 Figures
Bibliography:3 Pages
7 Tables
Appendix:6 Pages
Abstract

With the emergence of strong visual-language capabilities, multimodal large language models (MLLMs) have demonstrated tremendous potential for real-world applications. However, the security vulnerabilities exhibited by the visual modality pose significant challenges to deploying such models in open-world environments. Recent studies have successfully induced harmful responses from target MLLMs by encoding harmful textual semantics directly into visual inputs. However, in these approaches, the visual modality primarily serves as a trigger for unsafe behavior, often exhibiting semantic ambiguity and lacking grounding in realistic scenarios. In this work, we define a novel setting: visual-centric jailbreak, where visual information serves as a necessary component in constructing a complete and realistic jailbreak context. Building on this setting, we propose the VisCo (Visual Contextual) Attack. VisCo fabricates contextual dialogue using four distinct visual-focused strategies, dynamically generating auxiliary images when necessary to construct a visual-centric jailbreak scenario. To maximize attack effectiveness, it incorporates automatic toxicity obfuscation and semantic refinement to produce a final attack prompt that reliably triggers harmful responses from the target black-box MLLMs. Specifically, VisCo achieves a toxicity score of 4.78 and an Attack Success Rate (ASR) of 85% on MM-SafetyBench against GPT-4o, significantly outperforming the baseline, which performs a toxicity score of 2.48 and an ASR of 22.2%. The code is available atthis https URL.

View on arXiv
@article{miao2025_2507.02844,
  title={ Visual Contextual Attack: Jailbreaking MLLMs with Image-Driven Context Injection },
  author={ Ziqi Miao and Yi Ding and Lijun Li and Jing Shao },
  journal={arXiv preprint arXiv:2507.02844},
  year={ 2025 }
}
Comments on this paper